
News
Quick Hits
News
Quick Hits
Commentary


Quick Hits
Commentary
Quick Hits
Commentary
News
Commentary
News
Great insightful article and good use of numbers. The No 1 issuee or concern is IoT security, and this appears again and again. However I dont see the enough people doing something about it. They just talk about it, and...
In reply to: Points week made
When police have to get a warrant to confiscate a computer of a student believed to have been behind an attack on a system, it goes to show something could be fundermentally flawed... the student should be rewarded for finding...
In reply to: re: Hacking Higher Education - reward the clever guys
Not entirely true. We have a solution that will prevent DDos attacks originating within a network and behind the firewall directed against servers with our protection. (No URL's are allowed here.) Look...
In reply to: You have to start looking at internal DDoS defense, but no one is doing it
Very information artcile, SDN would indeed be a game changer!
In reply to: SDN is the Future
The last thing you want is for the encryption keys to be stored inside an insecure database, for example.Unfortunately there are only a few SaaS / cloud tools that are really end-to-end encrypted. (Like Stackfield or Mailbox.org)...
In reply to: Encryption
These are all good, but one of the most important questions an SMB can ask is about the availability of support. Sometimes cloud services -- particularly their SMB packages -- offer very limited support, which may...
In reply to: 6th question
This is a good overview of AppSec in the microservicse space. The visibility aspect of Best Practice 1 is crticial, you can't discover or monitor without it. The challenge is how do you acheive that visibility? With dynamically...
In reply to: Visibility is key
Another point I would like to make is that sometimes we take one problem and make it very big, this simply be a case that somebody copy/paste the data from Amazon to other systems and that is how it is being exposed....
In reply to: Mexican Voter Database Exposed
"... Developers or administrators may be new to the technology and may not fully understand how to deploy it securely. ..." This is an important point I think. We know some of the EC2 outages were because of misconfiguration,...
In reply to: Re: Security Shortcoming
"... Hard to say, but I would suggest it lands on the entity using the service ..." I mostly agree but there is always a fine line that overall system not having enough security measures (such as layered) and it is hard...
In reply to: Re: Security Shortcoming
8 Key Building Blocks for Enterprise Network DefenseNetworks are changing rapidly -- and so are strategies for protecting them. This Tech Digest looks at the fundamentals for the next-gen environment.