Breaking and protecting devops tool chains

Ken Johnson, CTO of nVisium, and Chris Gates, Senior Security Engineer at Uber talk to CSO Online's Steve Ragan about working with devops tool chains.

Want privacy? Congress says you'll have to pay for it

When this week, it threw data security under the bus as well. Internet users who want to protect their data can expect to pay a "privacy tax" as a...

Free tools for your cyber-security efforts

There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial ware-based enticements designed to lure decision...

Ransomware 'customer support' chat reveals criminals' ruthlessness

Ransomware criminals chatting up victims, offering to delay deadlines, showing how to obtain Bitcoin, dispensing the kind of customer support that consumers lust for from their cable and mobile plan...

Hacking the 2016 election: A timeline

History has yet to judge the 2016 presidential election, but from where we sit in the early days of 2017, it’s hard to imagine that it will ever be relegated...

Trump stresses cybersecurity but postpones executive order

U.S. President Donald Trump called on government agencies to better protect their networks, but he delayed signing an executive order to kick-start a government-wide review of cybersecurity policy.A , leaked earlier, would...

Ransomware disrupts Washington DC's CCTV system

About 70 percent of the cameras hooked up to the police’s closed-circuit TV (CCTV) system in Washington, D.C., were reportedly unable to record footage for several days before President Trump’s...

VMware removes hard-coded root access key from vSphere Data Protection

VMware has released a hotfix for vSphere Data Protection (VDP) to change a hard-coded SSH key that could allow remote attackers to gain root access to...

How secure is your supply chain?

Today’s global supply chains carry risks that run the gamut from pirates off the coast of East Africa to bad guys tampering with goods in transit. And international supply chains...

Critical flaw alert! Stop using JSON encryption

A vulnerability in a JSON-based web encryption protocol could allow attackers to retrieve private keys. Cryptography experts have advised against developers using JSON Web Encryption (JWE) in their applications in...

STAY CONNECTED

2,973,060FollowersFollow
13,460,346FollowersFollow
6,425SubscribersSubscribe