Sat.Mar 21, 2015 - Fri.Mar 27, 2015

article thumbnail

Vagrant Boxes: Private Vagrant Box Hosting With Easy Versioning

NopSec

At NopSec, we are using vagrant and packer to spin up local dev environments and build our instances across the various hypervisor and cloud providers we use. We have packer scripts that build our VirtualBox and VMware images used in local development and our various instances used in our cloud providers. An issue I had to solve recently was how best to share development vagrant boxes within our team.

article thumbnail

Online Dating Site Hit with Anti-Spam Law Fine

Privacy and Cybersecurity Law

On the heels of issuing its first Notice of Violation under Canada’s Anti-spam Legislation (CASL) earlier this month, the Canadian […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mapping Penetration Testing report and vulnerability management CVEs

NopSec

Penetration tests are point-in-time adversarial tests aimed at testing the intrusion prevention, detection, and incident response capabilities and controls of an organization. Usually well-trained penetration testers produce reports including the attack vectors and exploits used to successfully attack the network / application and the related vulnerabilities / CVEs exploited during the penetration test.

article thumbnail

ECJ case on Safe Harbor

Privacy and Cybersecurity Law

The ECJ heard arguments, this week, in the action against the Irish Data Protection Commissioner that Safe Harbor should be […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Cyber Vulnerability in Wind Turbines

Privacy and Cybersecurity Law

It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked. Due to […].

Hacking 40