article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Anton on Security

Overall, here is how word cloud of our 2023 episode titles looks like: (src) Top episodes from all years: “EP1 Confidentially Speaking“ “EP2 Data Security in the Cloud“ “EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil” “EP3 Automate and/or Die?” EP47 Megatrends, Macro-changes, Microservices, Oh My! More video!

article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Nikita Kislitsin , formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. A 2010 indictment out of New Jersey accuses Ieremenko and six others with siphoning nonpublic information from the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Easy Hacks on Telephone Entry Systems

Security Boulevard

Here’s my Channel 2600 recording from the Next HOPE (2010): Telephone entry systems are practically everywhere in the city. Blast from the past. An investigation after a series of break-ins uncovered several shockingly simple bypass techniques currently used by criminals.

Hacking 59
article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Security Boulevard

Overall, here is how word cloud of our 2023 episode titles looks like: (src) Top episodes from all years: “EP1 Confidentially Speaking“ “EP2 Data Security in the Cloud“ “EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil” “EP3 Automate and/or Die?” EP47 Megatrends, Macro-changes, Microservices, Oh My! More video!

article thumbnail

Twitter security under scrutiny after former executive turns whistleblower

Malwarebytes

Provided these accusations are true, the disclosure shows a side of Twitter that poses a threat to its own users' personal information, to company shareholders, to national security, and to democracy. Otherwise known as Mudge, Peiter Zatko is a network security expert, open source programmer, writer, and a hacker.

article thumbnail

Why SASE matters and what security pros need to know

SC Magazine

Some benefits of SD-WAN include faster networks, improved resiliency, the ability to prioritize bandwidth to critical applications, and potential cost savings. Firewall-as-a-Service (FWaaS): Since 2007, next-generation firewalls (NGFWs) have been a staple in network security.

article thumbnail

Router Spring Cleaning – No MOP Required — Again

Cisco Security

Way back in May 18, 2010, Dario Ciccarone of The Cisco Product Security Incident Response Team (PSIRT) published a blog post called Router Spring Cleaning – No MOP Required. The current advice really hasn’t changed from what was recommended way back in 2010 and as per the hardening guide. Recommendations for MOP.