Zero trust and the role of least privilege for securing cloud workloads

Zero trust and the role of least privilege for securing cloud workloads

Zero trust and the role of least privilege for securing cloud workloads This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

What Pandemic Responses Teach Us About Cybersecurity

What Pandemic Responses Teach Us About Cybersecurity

I’ve been working at Tripwire for over two decades, and I’ve acquired a fair bit of swag over those years: branded jackets, hats, shoes, a watch, and of course a drawer full of t-shirts. One thing I never would have predicted owning was a Tripwire-branded face mask to protect me from a global pandemic. Over the past year, I’ve worn that face mask more than any of my other swag. Of course, none of my…

Read More

The Journey into Cybersecurity: Movies, Military, and Dance Parties

The Journey into Cybersecurity: Movies, Military, and Dance Parties

Cybersecurity is one of the fastest-growing fields, not just in computer science but arguably in all industries. What is even more fascinating is that no matter how many newly trained cybersecurity professionals emerge each day, there is still a need for many more. The industry is in dire need of people, not only with the knowledge but also with the passion to make the cyber-world a safer place for everyone. What Makes Cybersecurity So Attractive? It is…

Read More

Aruba switch can cut the need for separate, single-function appliances

Aruba switch can cut the need for separate, single-function appliances

Hewlett Packard Enterprise company Aruba is taking the wraps of a new flagship data-center switch aimed at helping to better control and secure hybrid-cloud traffic in the enterprise. The Aruba CX 10000 Series switch is a top-of-rack, L2/3 data-center box that the with 3.2Tbps of switching capacity, 48 ports of line rate 10/25GbE and six 40/100GbE ports, the company says. But its most intriguing component is an integrated Elba programmable data processing unit (DPU) from…

Read More

Apple iCloud Hacker Steals Nudes

Apple iCloud Hacker Steals Nudes

A 40-year-old man from California has admitted his role in a conspiracy to break into the private digital photo libraries of Apple customers to locate and steal sexually explicit images. Hao Kuo Chi, a resident of the city of La Puenta in Los Angeles County, pleaded guilty to charges of computer fraud and conspiracy on Friday, October 15.  According to documents submitted to a court in Tampa, Florida, Chi conspired with other unknown individuals to gain unauthorized…

Read More

Learn How Tabnine Enables “Pair Programming” with AI

Learn How Tabnine Enables “Pair Programming” with AI

When I was learning to write Python, I  did a lot of pair programming. Pair programming is where two engineers/developers work using only one machine – taking it in turns to write code (often coding every 15 minutes and swapping over). This technique is awesome for learning from each other. As our team members are now all working from home and in different time zones, collaboration has become a lot more challenging. Enter the Tabnine AI…

Read More

Why NDR? See the Entire Elephant in the Room

Why NDR? See the Entire Elephant in the Room

By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention System (IPS) to screen traffic coming into the network, but as IT technology and security technology have evolved due to modern attacks leveraging more complex approaches, the definition is much broader now….

Read More

Sinclair TV stations downtime allegedly caused by a ransomware attack

Sinclair TV stations downtime allegedly caused by a ransomware attack

A ransomware attack is likely the cause of the recent downtime for TV stations owned by the Sinclair Broadcast Group broadcast television company. TV stations owned by the Sinclair Broadcast Group went down over the weekend officially due to technical issues, but some media [1,2] reported that it was a victim of a ransomware attack. The alleged attack compromised the Sinclair internal corporate network, the broadcasting systems of TV stations, email servers, and phone services…

Read More

Prison for UPMC Data Thief

Prison for UPMC Data Thief

A hacker from Michigan who stole and sold the sensitive data of tens of thousands of University of Pittsburgh Medical Center (UPMC) employees has been sent to prison.  Former Federal Emergency Management Agency (FEMA) IT specialist Justin Sean Johnson pleaded guilty on May 20 to counts 1 and 39 of a 43-count indictment. The court heard that the 30-year-old former resident of Detroit admitted infiltrating and hacking into the UPMC’s human resources server database in 2013 and…

Read More

Forensic Collections From a Mac: CHALLENG ES & SOLUTIONS

Forensic Collections From a Mac: CHALLENG  ES & SOLUTIONS

INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches without first understanding some critical differences between Operating systems (HFS+, APFS and Windows file systems). With digital forensic professionals seeing more Mac laptops and other Apple devices more often, we created this guide to identify a few challenges that law enforcement and digital investigators may encounter and provide solutions and best practices for tackling these obstacles both…

Read More
1 3,232 3,233 3,234 3,235 3,236 3,781