The convicted co-author of the highly disruptive Mirai botnet malware strain has been sentenced to 2,500 hours of community service, six months home confinement, and ordered to pay $8.6...
Read more7 Ways an Old Tool Still Teaches New Lessons About Web AppSec
October 30 2018Are your Web applications secure? WebGoat, a tool old enough to be in high school, continues to instruct. In the fast-changing world of IT security, using a 15-year-old tool...
Read more7 Ways an Old Tool Still Teaches New Lessons About Web AppSec
October 30 2018Are your Web applications secure? WebGoat, a tool old enough to be in high school, continues to instruct. In the fast-changing world of IT security, using a 15-year-old tool...
Read moreCSO Online | Oct 11, 2018 Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips — allowing hackers to...
Read moreCSO Online | Oct 11, 2018 Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips — allowing hackers to...
Read moreDevSecOps An Effective Fix for Software Flaws
October 29 2018Organizations seeking to fix flaws faster should look to automation and related methodologies for success, says a new report. Knowing a vulnerability’s severity might not tell you anything about...
Read moreDevSecOps An Effective Fix for Software Flaws
October 29 2018Organizations seeking to fix flaws faster should look to automation and related methodologies for success, says a new report. Knowing a vulnerability’s severity might not tell you anything about...
Read moreSecuring Severless: Defend or Attack?
October 29 2018The best way to protect your cloud infrastructure is to pay attention to the fundamentals of application security, identity access management roles, and follow configuration best-practices. Part one of...
Read moreSecuring Severless: Defend or Attack?
October 29 2018The best way to protect your cloud infrastructure is to pay attention to the fundamentals of application security, identity access management roles, and follow configuration best-practices. Part one of...
Read moreStop Doing Business with Cybersecurity Cheapskates
October 29 2018I live in a suburban city in Silicon Valley. Every year, at least one or two homes in myneighborhood get tented for termite fumigation. I’ve had to do my...
Read more
Recent Comments