Countering the fog of war in cybersecurity

Countering the fog of war in cybersecurity

Countering the fog of war in cybersecurity This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Salesforce Monitoring with Tripwire Configuration Manager

Salesforce Monitoring with Tripwire Configuration Manager

You may already know that Tripwire Configuration Manager can audit your cloud service provider accounts like AWS, Azure, and Google Cloud Platform, but did you know it also has capabilities to monitor other cloud based software services such as Salesforce?   Salesforce is a popular customer relationship management (CRM) service with rich configuration options that could lead to unintended risks if it is improperly configured. Tripwire has created a security policy within Configuration Manager which can…

Read More

Learning All About Ghidra – Inside a Class with Craig Young

Learning All About Ghidra – Inside a Class with Craig Young

I was recently tasked with reverse engineering (RE) some mobile apps. The actual task was to “learn” to RE – I don’t actually know how to do it, so it’s a good thing it’s more of a learning experience than an actual security job. And the task wasn’t really to RE apps. It was “do a security check on these mobile apps.” I’ve never done that and didn’t even know where to start. RE? Disassemble?…

Read More

Is the Edge Really Secure?

Is the Edge Really Secure?

By Chetan Venkatesh, CEO and Co-Founder of Macrometa The simplest answer is… No. But, if history has taught security professionals anything it’s that the most secure network is the one without any users. It also happens to be the least useful of networks.   So what are we actually asking when we discuss security and the edge? Most often, the question is usually hiding the subtext of:   “In a new deployment methodology involving edge…

Read More

Application Modernization and Other Best Practices of Securing Legacy Infrastructures

Application Modernization and Other Best Practices of Securing Legacy Infrastructures

By Roman Davydov, Technology Observer, Itransition Legacy systems continue to play a vital role in the operations of many enterprises. However, over time, things like poor user adoption, increased maintenance costs, frequent errors and downtime significantly reduce the value of such digital solutions. The situation may be even worse if we look at legacy software from the cybersecurity perspective. Legacy vulnerabilities pose one of the biggest enterprise cyber threats; experts state that any software that…

Read More

Cyber-attack Response Takes More than Two Working Days

Cyber-attack Response Takes More than Two Working Days

Organizations around the world take on average more than two business days to respond to a cyber-attack, according to new research by American cybersecurity company Deep Instinct.  The finding was published in the company’s second bi-annual Voice of SecOps Report, which was based on a survey of 1,500 senior cybersecurity professionals in 11 countries who work for businesses with more than 1,000 employees and annual revenue north of $500m.  The survey revealed the average global response time…

Read More

Dutch police warn customers of a popular DDoS booter service

Dutch police warn customers of a popular DDoS booter service

Dutch police warn customers of a distributed denial-of-service (DDoS) website of stopping using the service to avoid prosecution. Dutch police warn customers of a booter service, abused to carry out distributed denial-of-service (DDoS) attacks, of to stop using it to avoid prosecution. The letter sent by the Dutch Police aims to work as a deterrent for cybercriminal activities explaining to them the consequence of prosecution due to criminal activities. The Dutch authorities have already contacted…

Read More

Researchers Condemn Apple’s Proposed Phone-Scanning Features

Researchers Condemn Apple’s Proposed Phone-Scanning Features

Apple’s plans to implement new phone-scanning features have been heavily criticized by more than a dozen cybersecurity experts. The tech company announced in August its intention to start scanning iPhone users’ iCloud Photos libraries. Apple presented the move under the pretext that it would locate users’ caches of illicit content, including child sexual abuse material (CSAM). In September, after its plans to introduce the new technology were widely condemned, Apple said the launch of the phone-scanning feature would…

Read More
1 2,202 2,203 2,204 2,205 2,206 2,757