Race Ahead to Kubernetes: A Learning Path for System Administrators – VMware Cloud Community

Race Ahead to Kubernetes: A Learning Path for System Administrators – VMware Cloud Community

Kubernetes has quickly emerged as one of the leading cloud technologies—and for good reason. Kubernetes makes it possible to deploy modern applications that are scalable, modular, and fault-tolerant. You declare the state you need your environment to be in and it constantly works to maintain that state, which frees up teams from manual tasks around infrastructure management. While Kubernetes has been popular with developers for a number of years, it’s now moving steadily into production…

Read More

Frequently asked questions on Extended Detection and Response

Frequently asked questions on Extended Detection and Response

This article answers a few of the more common questions from those who are trying to figure out the XDR space. Image: iStock/LeoWolfert As is expected with any new market segment or capability, questions about extended detection and response (XDR) abound. This article answers a few of the more common questions from those that are trying to figure this space out.  What Is XDR?  An incredibly simplified way of thinking about XDR is that it…

Read More

Back-to-Basics: Use Strong Passwords

Back-to-Basics: Use Strong Passwords

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

Anomali Cyber Watch: APT31 Targeting French Home Routers, Multiple Microsoft Vulnerabilities, StrongPity Deploys Android Malware, and More

Anomali Cyber Watch: APT31 Targeting French Home Routers, Multiple Microsoft Vulnerabilities, StrongPity Deploys Android Malware, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Cryptojacking, Downloaders, Malspam, RATs, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and…

Read More

How to create a positive and effective cybersecurity environment instead of a shame culture

How to create a positive and effective cybersecurity environment instead of a shame culture

You can catch more flies with honey than vinegar. Learn some tips to establish a positive reinforcement cybersecurity culture rather than a blame-and-shame game. Image: Nicoleta Ionescu/Shutterstock I once worked in an environment where adding users to Active Directory privileged groups was forbidden except via an official request approved by the individuals’ managers. This was carefully monitored, and on one occasion an email went out to a massive group of people stating the policy had…

Read More

Trust Not in Third-Parties

Trust Not in Third-Parties

You aren’t on your own in cybersecurity, but you should act like you are By Gregory Hoffer, CEO, Coviant Software Cybersecurity management is a dynamic process. There is no “set it and forget it.” Things move fast, conditions change constantly, and often the things that change happen beyond your control or notice. For organizations heavily invested in cloud services, the applications and computing instances you rely may change moment-to-moment. It’s hard to keep up. Modern…

Read More

No More Ransom helped ransomware victims to save almost €1B

No More Ransom helped ransomware victims to save almost €1B

The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for free saving almost €1 billion in payments. No More Ransom is celebrating its 5th anniversary, the initiative allowed more than 6 million ransomware victims to recover their files for free saving roughly $1 billion in ransom payments. The “No More Ransom” website is an initiative launched in 2016 by the National High Tech Crime Unit…

Read More

Microsoft warns of credential-stealing NTLM relay attacks against Windows domain controllers

Microsoft warns of credential-stealing NTLM relay attacks against Windows domain controllers

To ward off the attack known as PetitPotam, Microsoft advises you to disable NTLM authentication on your Windows domain controller. Image: iStockphoto/ipopba Microsoft is sounding an alert about a threat against Windows domain controllers that would allow attackers to capture NTLM (NT LAN Manager) credentials and certificates. In an advisory released last Friday, the company warned of an attack dubbed PetitPotam, which could be used against Windows domains controllers and other Windows servers. SEE: Checklist: Securing…

Read More

What is a VPN and Can it Hide My IP Address?

What is a VPN and Can it Hide My IP Address?

There’s a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they offer. For this article, I’d like to do some myth-busting about how a VPN actually works and why you should use one.  What is a VPN and how does it protect me?  A VPN is an app that you install on your device to help keep your personal data safe as you browse the internet   You may have heard that VPN apps live on your device and allow you to connect to the internet securely. What that…

Read More

What is a VPN and Can it Hide My IP Address?

What is a VPN and Can it Hide My IP Address?

There’s a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they offer. For this article, I’d like to do some myth-busting about how a VPN actually works and why you should use one.  What is a VPN and how does it protect me?  A VPN is an app that you install on your device to help keep your personal data safe as you browse the internet   You may have heard that VPN apps live on your device and allow you to connect to the internet securely. What that…

Read More
1 2,231 2,232 2,233 2,234 2,235 2,648