How to establish strong microservice security using SSL, TLS and API gateways
Tech Republic Security
MARCH 23, 2017
Microservices require special security measures to reduce risk. Learn the specifics as recommended by an industry expert.
Tech Republic Security
MARCH 23, 2017
Microservices require special security measures to reduce risk. Learn the specifics as recommended by an industry expert.
Scary Beasts Security
MARCH 29, 2017
Overview Robust evidence existed for the presence of a memory corruption based RCE (remote code execution) on box.com servers. The most likely explanation for the evidence presented is the usage of an old ImageMagick which has known vulnerabilities, combined with lack of configuration lockdown. It's hard to be sure, though: see the section on the Box response below.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Elie
MARCH 2, 2017
In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.
NopSec
MARCH 23, 2017
How can I find security people, how do I deal with budget and time, how should I prioritize, what will have the most impact on the business, what will reduce my risk the most? These are the questions that are facing many security teams. In the vulnerability space many are still working off of spreadsheets and ad hoc reports in order to answer these questions.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Penetration Testing
MARCH 8, 2017
Tails OS, also known as “The Amnesic Incognito Live System,” is a privacy-focused operating system based on Debian Linux. It is designed to protect your online privacy and anonymity by routing all your internet... The post Tails 6.4 releases: privacy-focused operating system based on Debian Linux appeared first on Cybersecurity News.
The Falcon's View
MARCH 30, 2017
In a moment of introspection last night, it occurred to me that working from home tends to amplify any perceived slight or sources of negativity. Most of my "human" interactions are online only, which - for this extrovert - means my energy is derived from whatever "interaction" I have online in Twitter, Facebook, email, Slack, etc. It turns out that this can be highly problematic.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Andrew Hay
MARCH 20, 2017
As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies. Who is looking… This guy.
Tech Republic Security
MARCH 2, 2017
In a recent annual report filed with the SEC, Yahoo confirmed that forged cookies were used to hack 32 million accounts. Here's what it means and why your company should be aware of such attacks.
Tech Republic Security
MARCH 29, 2017
Congress has voted to repeal restrictions preventing ISPs from gathering and selling your browsing data and other personal info. Here's how you can protect yourself.
Tech Republic Security
MARCH 24, 2017
From Bad Luck Brian to Confession Bear to Scumbag Steve, these are the best tech-flavored memes the Internet has to offer
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
MARCH 2, 2017
No one is safe from malware these days, even macOS users. 2017 has been a banner year for malware on Apple computers, including a new threat that allows total remote control from a web console.
Tech Republic Security
MARCH 1, 2017
Certain Mac malware can access a user's webcam to spy on them undetected. Here's how you can use the free tool OverSight to protect yourself.
Tech Republic Security
MARCH 29, 2017
Stagnant wages, high demands, and poor work/life balance compound the skills gap for security practitioners. Here's how your company can better recruit and retain them.
Tech Republic Security
MARCH 24, 2017
A group of hackers calling themselves the Turkish Crime Family claim that they will wipe millions of stolen iCloud accounts if Apple doesn't meet their demands.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Tech Republic Security
MARCH 10, 2017
Microservices are subcomponents of applications which can yield greater efficiencies. Learn about their benefits as well as security best practices.
Tech Republic Security
MARCH 31, 2017
The UN Cybersecurity Repository is a massive index of cyber-criminal case law and lessons learned used to train law enforcement officers, prosecutors, and judges.
Tech Republic Security
MARCH 22, 2017
Some view cloud migration as a way of outsourcing cybersecurity. IBM recommends you chart out which security features are included in your cloud platform, and which have to be added.
Tech Republic Security
MARCH 24, 2017
Instagram recently made two-factor authentication available to all of its users. Here's how you can use it to add an extra layer of security to your account.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Tech Republic Security
MARCH 15, 2017
Ransomware experienced explosive growth last year, with businesses and individuals losing more than $1 billion to retrieve their encrypted information.
Tech Republic Security
MARCH 29, 2017
Cybercriminals compromised more than 4 billion records last year, including credit cards, passwords, health information, and business documents. Here's how to stay safe.
Tech Republic Security
MARCH 14, 2017
Researchers at Ben-Gurion University in Israel have developed a new technique to combat cyber attacks, which they say can protect against any attack carried out through internet photo and video.
Tech Republic Security
MARCH 13, 2017
Codified Security's research found backdoors that could lead to stolen customer information and worse: They could give hackers access to developer's servers and computers as well.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Tech Republic Security
MARCH 2, 2017
A new report from the ISACA said that security and privacy are the top concerns for business leaders looking to implement drone technology in their organization.
Tech Republic Security
MARCH 30, 2017
Republicans in Congress just voted to strip away guidelines protecting web browsing data for consumers, in a landmark victory for ISPs including AT&T, Verizon, and Comcast.
Tech Republic Security
MARCH 30, 2017
If you're looking for an easy way to encrypt directories in Linux, here's an introduction to eCryptfs. Mount an encrypted directory, add data, and unmount the directory. Data secured.
Tech Republic Security
MARCH 22, 2017
Google recently noted that it had seen a 32% rise in hacked website. Here are the most common tactics it found.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Tech Republic Security
MARCH 16, 2017
For some businesses, serving up websites via HTTPS is a must-have. Here's how to configure secure http Apache on CentOS.
Tech Republic Security
MARCH 9, 2017
This comprehensive guide covers everything you need to know about deep packet inspection, the practice of sniffing web connections to reveal sensitive user data and fend off cyberattacks.
Tech Republic Security
MARCH 29, 2017
Two out of five industrial computers faced cyberattacks in the second half of 2016, according to Kaspersky Lab, and the risk is increasing. Here's how to prevent these attacks.
Tech Republic Security
MARCH 13, 2017
More than 63 million LinkedIn users employ common passwords, or reuse passwords, putting them at risk for cyber attacks. Here's how to protect your company.
Speaker: Sierre Lindgren
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Let's personalize your content