News Category: Security

Intel Puts Numbers on the Security Talent Shortage

The cybersecurity shortfall in the workforce remains a critical vulnerability for companies and nations, according to anIntel Security report being issued today. Eighty-two percent of surveyed respondents reported a shortage of security skills, and respondents in every country said that...
Read 0 Comments

Europol, Intel and Kaspersky Team Up to Crack Down on Ransomware

Paying those who take your data hostage only makes the ransomware problem worse, says Kaspersky. The European Police Agency Europol on Monday announced a collaboration with tech giant Intel, security expert Kaspersky Lab and the Netherlands police to tackle the exponential growth of ransomware use...
Read 0 Comments

security-3-locks.jpg

security approaches
Companies with stakes in the container landscape adopt different approaches toward security. This article looks at how organizations can adapt their approach to keep pace with the rapid evolution of containers.

Fix Bugs, Go Fast, and Update: 3 Approaches to Container Security

Containers are becoming the central piece of the future of IT. Linux has had containers for ages, but they are still maturing as a technology to be used in production or mission-critical enterprise scenarios. With that, security is becoming a central theme around containers. There are many proposed...
Read 0 Comments

Most Companies Still Can't Spot Incoming Cyberattacks

Four out of five businesses lack the required infrastructure or security professionals with relevant skills to spot and defend against incoming cyberattacks. According to a new report by US cybersecurity and privacy think tank Ponemon Institute on behalf of cybersecurity firm BrandProtect, 79...
Read 0 Comments

AT&T Unveils Powerful New Security Platform

AT&T this week unveiled a new powerful security platform, using big data analysis based on a Hadoop architecture which allows the company to ingest and analyze 5 billion security events in less than ten minutes. Developed over the last three-and-a-half years as part of the Domain 2.0 push to...
Read 0 Comments

Software Security: Does Quality Provide a Blueprint for Change?

Software security has been in the news a lot lately, between various high profile social media hacks to massive data breaches it feels like people in the industry are always talking about security, or more appropriately, the lack thereof. While having a conversation with somebody from my company’s...
Read 0 Comments

The Truth About Penetration Testing Vs. Vulnerability Assessments

Organizations Must Put Security Vulnerabilities Into the Context of Their Exploitability Vulnerability assessments are often confused with penetration tests. In fact, the two terms are often used interchangeably, but they are worlds apart. To strengthen an organization’s cyber risk posture, it is...
Read 0 Comments

Network Security: The Unknown Unknowns

Using the Assimilation Project to Perform Service Discovery and Inventory of Systems I recently thought of the apocryphal story about the solid reliability of the IBM AS/400 systems. I’ve heard several variations on the story, but as the most common version of the story goes, an IBM service...
Read 0 Comments

New Mozilla Fund Will Pay for Security Audits of Open-Source Code

A new Mozilla fund, called Secure Open Source, aims to provide security audits of open-source code, following the discovery of critical security bugs like Heartbleed and Shellshock in key pieces of the software. Mozilla has set up a $500,000 initial fund that will be used for paying professional...
Read 0 Comments

Tails, the Anonymity-Focused Linux Distribution with Deep Tor Integration, Reaches Version 2.4

Tails is a Linux distribution most famously used by Edward Snowden. Boot Tails from a live DVD, USB drive, or SD card and it will turn any PC into a more private and anonymous system. Tails forces all network activity to go through the Tor network, preserving anonymity and bypassing Internet...
Read 0 Comments

Pages