Do You Know Who’s Lurking in Your Cloud Environment?
November 25 2020A security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.
Read moreA security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.
Read moreDon't ignore cyber operations outside US and European interests, researcher says. We can learn a lot from methods used by attackers that aren't among the usual suspects.
Read moreThe "OODA loop" shows us how to secure cloud-native deployments and prevent breaches before they occur.
Read moreCybersecurity training needs an overhaul, though the training itself is only one small part of how security teams can influence user behavior.
Read moreHere's the latest Naked Security Podcast - listen now!
Read moreIn a lecture, Adam Shostack makes the case for a discipline of cyber public health. It would relate to cybersecurity in a similar way that public health relates to...
Read moreThe malware takes advantage of how the Windows command line interpreter works to try and slip past anti-detection tools, Huntress Labs says.
Read moreSeveral apps available on the Google Play Store, including two made by Chinese Internet giant Baidu, leaked information about the phone's hardware and location without the user's knowledge, research...
Read moreAs data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic "keep good backups" advice.
Read moreThe agency urges shoppers to be cautious of fraudulent websites, unsolicited emails, and unencrypted financial transactions.
Read more
Recent Comments