Remove 2020 Remove Architecture Remove Blog Remove System Administration
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

At this year’s Conference 46 percent of all keynote speakers were women,” according to Sandra Toms, VP and curator, RSA Conference, in a blog she posted on the last day of this year’s event. Thursday, November 5, 2020. Director, Industry Solutions Americas Solutions Architecture & Customer Success. Live Panel. Register Now.

article thumbnail

macOS 11’s hidden security improvements

Malwarebytes

At the WWDC 2020, Apple made a big deal of several new macOS and iOS features that were, in fact, big deals. Apple’s Protecting data at multiple layers article briefly describes SSV, but Howard Oakley has an even more detailed write-up on his blog , with illustrations; a must-read. Secret messages revealed?

Firmware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A guide to OWASP’s secure coding

CyberSecurity Insiders

This blog was written by an independent guest blogger. Modern organizations rely heavily on software and systems. Secure coding standards are significant, as they give some assurance that software installed on the organization’s system is protected from security flaws. Input validation. File management.

article thumbnail

Establish security boundaries in your on-prem AD and Azure environment

Security Boulevard

This blog post provides a high-level explanation of how to implement security boundaries in an on-prem AD and Azure environment to protect your critical assets based on the principle of tiered administration, including how BloodHound Enterprise can help you in the process. Teal has a blog post on PAW available here.