Consider these credentials when hiring a ransomware negotiator

Consider these credentials when hiring a ransomware negotiator

Consider these credentials when hiring a ransomware negotiator | 2020-12-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Supporting your security team remotely

Supporting your security team remotely

Supporting your security team remotely | 2020-12-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Ghidra 101: How to Use the Cursor Text Highlighting Feature

Ghidra 101: How to Use the Cursor Text Highlighting Feature

In this blog series, I will be putting the spotlight on useful Ghidra features that you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective while reverse engineering. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively. What is Cursor Text Highlighting? In this post, I will be discussing the Cursor…

Read More

4 Things a Good Vulnerability Management Policy Should Include

4 Things a Good Vulnerability Management Policy Should Include

Organizations face an ever-evolving threat landscape. With this in mind, it is imperative that organizations keep an up-to-date vulnerability management policy for remediating and controlling security vulnerabilities that may lead to a breach. A good vulnerability management policy should contain the following: An Overview of what the policy is intended to do. The Scope of the policy. Roles and Responsibilities under the organization. Vulnerability Remediation/Risk Mitigation. Overview Taking the time to give a short summary…

Read More

Protecting Workloads Across Any Cloud and Application…Anywhere!

Protecting Workloads Across Any Cloud and Application…Anywhere!

Register to attend the December 14 webinar: Protecting your Cloud-Native Applications with Cisco Secure Workload This blog is authored by Ed McNicholas, Cybersecurity Technical Solutions Architect for the Cisco Global Security Sales Organization Automating and implementing a secure, zero-trust model for micro-segmentation based on application behavior and telemetry is easy to do using Cisco Secure Workload (formerly known as Tetration). See how your business can seamlessly achieve workload protection by providing: Reduced attack surface –…

Read More

Aruba unveils new data-center orchestration software, switches

Aruba unveils new data-center orchestration software, switches

Aruba has taken the wraps off new orchestration software and switches that target users looking to build and support distributed data-centers. Aruba Fabric Composer software simplifies leaf-and-spine network provisioning across the company’s CX switches and automates operations across a wide variety of virtualized, hyper-converged, and HPE compute and storage environments. The Fabric Composer runs as runs as a virtual machine and eliminates the need for networking teams to manually configure CX switches. It offers workflow…

Read More

Juniper reinforces its intent-based networking with Apstra buy

Juniper reinforces its intent-based networking with Apstra buy

Looking to shore-up its intent-based networking software portfolio, Juniper has said it will buy Apstra for an undisclosed amount.  Founded in 2014, Apstra’s claim to fame is its flagship Apstra Operating System (AOS) software which was developed from the start to support IBN features. Once deployed, AOS keeps a real-time repository of configuration, telemetry and validation information to constantly ensure the network is doing what the customer wants it to do. AOS also includes automation…

Read More

Six Reasons to Review Your Identity and Access Management Strategy – Cyber Defense Magazine

Six Reasons to Review Your Identity and Access Management Strategy – Cyber Defense Magazine

Articles and blogs about Identity and Access Management (IAM) can be found on just about any technology-related website. Many articles point out the benefits of the myriad tools and products that will magically give you a complete IAM system or fill some gap in your IAM posture. But for those who are a little less mature in their journey or who have not revisited their IAM Program since the iPhone 4, there’s good reason to…

Read More

Top 5 reasons not to use SMS for multi-factor authentication

Top 5 reasons not to use SMS for multi-factor authentication

Using SMS as an additional means to authenticate your password is better than nothing, but it’s not the most reliable. Tom Merritt lists five reasons why SMS should not be used for MFA. Multi-factor authentication (MFA), or as we used to call it two-factor authentication, is essential–it means you don’t rely on your password alone for security. That password is something you know, but with MFA you also rely on other factors, like something you…

Read More
1 3,353 3,354 3,355 3,356 3,357 3,460