7 Use Cases for Distributed Cloud Environments
January 9 2023As infrastructure has grown more complex, the need to effectively manage it has grown, too – particularly for applications and APIs.
Read moreA model of continuous authentication and identification is needed to keep consumers safe.
Read moreThey're saying "rotate secrets"... in plain English, they mean "change your credentials". The company has a tool to help you find them all.
Read moreIdentity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking...
Read moreIdentifying People Using Cell Phone Location Data
January 9 2023The two people who shut down four Washington power stations in December were arrested. This is the interesting part:
Investigators identified Greenwood and Crahan almost immediately after the attacks...
Read more
In Memoriam: Remembering Those Who Passed
January 7 2023Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe.
Read moreFriday Squid Blogging: Squid Fetish
January 7 2023Seems that about 1.5% of people have a squid fetish. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read moreUsing command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims.
Read moreIn what's become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied.
Read more
Recent Comments