Breaking the DDoS Attack Loop With Rate Limiting
May 16 2023This Tech Tip demonstrates how security engineers can best use rate limits to mitigate distributed denial-of-service attacks.
Read moreThis Tech Tip demonstrates how security engineers can best use rate limits to mitigate distributed denial-of-service attacks.
Read moreA misconfigured cloud instance exposed vehicle data, but not personally identifiable information, the car maker says.
Read moreWe asked you once, we told you twice, now we're ordering you for the third time...
Read moreA two-bit comedian is using a patched Microsoft vulnerability to attack the hospitality industry, and really laying it on thick along the way.
Read moreA predictable patch cadence is nice, but the software giant can do more.
Read moreUS Transportation Security Agency (TSA) administrator reflects on how the Colonial Pipeline incident has moved the needle in public-private cooperation.
Read moreMicro-Star International—aka MSI—had its UEFI signing key stolen last month.
This raises the possibility that the leaked key could push out updates that would infect a computer’s most nether...
Read more
This is a current list of where and when I am scheduled to speak: I’m speaking at IT-S Now 2023 in Vienna, Austria, on June 2, 2023 at 8:30 AM...
Read moreThe privilege escalation flaw is one in thousands that researchers have disclosed in recent years.
Read moreA video—authentic, not a deep fake—of a giant squid close to the surface. As usual, you can also use this squid post to talk about the security stories in the...
Read more
Recent Comments