Uncategorized

Open Source Does Not Equal Secure

Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people…

3 days ago

What Does a Unified Security Strategy in the Public Cloud Look Like?

Gain insight about how to build a unified security strategy across large network organizations and how to translate it to…

3 days ago

Understanding the 2019 Capital One Attack

Learn about how the Capital One attack was carried out, why Web Application Firewalls failed to prevent the attack, and…

3 days ago

Moving from Threat Hunting to Threat Catching

The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can…

4 days ago

Impressive iPhone Exploit

This is a scarily impressive vulnerability: Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a…

4 days ago

Manipulating Systems Using Remote Lasers

Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers…

5 days ago

90% of Companies Faced Increased Cyberattacks During COVID-19

A recent global study by Tanium of 1,000 CXOs reported on the effects of COVID-19 on enterprise and government organizations.…

7 days ago

Undermining Democracy

Last Thursday, Rudy Giuliani, a Trump campaign lawyer, alleged a widespread voting conspiracy involving Venezuela, Cuba, and China. Another lawyer,…

1 week ago

Does AD CS Work in the Cloud?

Digital certificates have taken over as the preferred method of network authentication because of their proven superiority to passwords in…

2 weeks ago

What’s the Difference between RADIUS, TLS, and EAP-TLS?

There are many components involved in running a secure network. It’s very easy to get bogged down by different terminology…

2 weeks ago