7 Use Cases for Distributed Cloud Environments
January 9 2023As infrastructure has grown more complex, the need to effectively manage it has grown, too – particularly for applications and APIs.
Read moreAs infrastructure has grown more complex, the need to effectively manage it has grown, too – particularly for applications and APIs.
Read moreA model of continuous authentication and identification is needed to keep consumers safe.
Read moreThey're saying "rotate secrets"... in plain English, they mean "change your credentials". The company has a tool to help you find them all.
Read moreIdentity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking...
Read moreThe two people who shut down four Washington power stations in December were arrested. This is the interesting part:
Investigators identified Greenwood and Crahan almost immediately after the attacks...
Read more
Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe.
Read moreSeems that about 1.5% of people have a squid fetish. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read moreUsing command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims.
Read moreIn what's become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied.
Read moreI’m not sure why, but Audiobooks.com is offering the audiobook version of Schneier on Security at 50% off until January 17. EDITED TO ADD: The audiobook of We Have Root...
Read more
Recent Comments