File systems and UUIDs on Linux

File systems and UUIDs on Linux

The /etc/fstab file is a very important file on Linux systems. It contains information that allows the system to connect to disk partitions and determine where they should be mounted in the file system. While this file has played an important role over the years, its format has changed with the introduction of UUIDs and, on some systems, a more reliable file-system type. Here’s an example of an /etc/fstab file on a Fedora system: $…

Read More

More Than a Quarter of Threats Never Seen Before

More Than a Quarter of Threats Never Seen Before

Over a quarter (29%) of threats spotted in Q4 2020 had never before been detected in-the-wild, giving attackers an advantage over their victims, according to HP Inc. The tech giant’s latest Quarterly Threat Insights Report was compiled from data gathered from its global customers’ Sure Click virtual machines from October to December 2020. While these isolated micro-VMs effectively segment malware from the endpoint and let it execute harmlessly, the widespread use of packers and obfuscation…

Read More

Security versus Compliance: What’s the Difference?

Security versus Compliance: What’s the Difference?

Security and compliance – a phrase often uttered in the same breath as if they are two sides of the same coin, two members of the same team or two great tastes that go great together. As much as I would like to see auditors, developers, and security analysts living in harmony like a delicious Reese’s cup, a recent gap analysis that I was part of reminded me that too often the peanut butter and…

Read More

3 must-read books on ISO 27001 – IT Governance UK Blog

3 must-read books on ISO 27001 – IT Governance UK Blog

As you start your ISO 27001 implementation project, you probably want to know about much as possible. Some people attend training courses to pick up the knowledge of ISO 27001, and others go one step further, hiring an ISO 27001 consultant to guide them through the process. Those are both excellent options for those with the time and budget, but what if you’re looking for a less expensive approach? In those cases, you can never…

Read More

Healthcare security: a specialized field

Healthcare security: a specialized field

Healthcare security: a specialized field | 2021-03-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Making videoconferences more secure

Making videoconferences more secure

Making videoconferences more secure | 2021-03-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cybersecurity and Geopolitical video podcast – March 2021 episode

Cybersecurity and Geopolitical video podcast – March 2021 episode

Cybersecurity and Geopolitical video podcast – March 2021 episode | 2021-03-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

To Patch or Not to Patch in OT – That Is the Real Challenge

To Patch or Not to Patch in OT – That Is the Real Challenge

The objective of an organization when implementing cybersecurity controls is to eliminate risk, but this oftentimes involves settling for managing risk at an acceptable level. Each organization defines what that acceptable level is depending on several factors including the environment, the criticality of function, the asset type, etc. There are many methods and techniques that an organization can then use to manage this risk. One of the most commonly used methods is patching. At the…

Read More

Four Strategies to Mitigate Pass-the-Cookie Attacks

Four Strategies to Mitigate Pass-the-Cookie Attacks

Another year, another new set of cybersecurity threats to overcome, outwit and mitigate against. At the beginning of 2021, the cybersecurity world was informed by CISA (the USA Cybersecurity and Infrastructure Security Agency) of a spate of attacks targeting cloud environment configurations, supposedly occurring as a result of the increase in remote working. Once you add to the mix the fact that corporate and personal devices were being used – often simultaneously – to access…

Read More

Future voices – education needs in the 21st Century – Cisco Blogs

Future voices – education needs in the 21st Century – Cisco Blogs

Learning for all ages moved online overnight when Covid struck. Many students adapted incredibly well to this new environment while others struggled due to lack of access. This experience has taught us valuable lessons and it’s forced us to think again about learning delivery. While there are very few cases where 100% virtual learning is the best long-term solution, there are definitely aspects of our recent experience that providers and students will want to keep….

Read More
1 3,782 3,783 3,784 3,785 3,786 4,096