Cloud misconfiguration: The security threat too often overlooked

<!-- Cloud misconfiguration: The security threat too often overlooked | InfoWorld

How to enforce SSL in ASP.Net Core

Secure Sockets Layer—SSL for short—is a standard security protocol that is used to encrypt communications between a web server and a web browser. SSL is important! Without it, information that...

Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted.

<!-- Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted. | InfoWorld

How to secure your PostgreSQL database

.(Insider Story)

IDG Contributor Network: How enterprise knowledge graphs can proactively reduce risk

Traditional enterprise risk management consisted of reactive reactionary efforts to specific domains such as cyber security, fraud detection, regulatory compliance, and legal compliance. Often, the goal was simply to minimize,...

IDG Contributor Network: Replication isn’t data protection. Here’s why

As data sets explode, more organizations are turning to disk-to-disk replication as an alternative to traditional tape backup workflows. Unfortunately, the benefits of replication are often outweighed by the risks...

Linus Torvalds: Changes in hardware change Linux development

In Linux Version 4.19, Linux’s developers had to deal with a hardware security bug, an issue that was particuarly frustrating becasue it was someone else’s bug. But  hopes that such...

VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45

In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.

Detecting bot attacks | Salted Hash Ep 44

In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.

IDG Contributor Network: How hybrid IT impacts identity management

Hybrid IT is disrupting many processes in IT organizations and contributing to organizational complexity. That complexity extends to identity management, which allows organizations to understand not only who has access...

STAY CONNECTED

2,973,060FollowersFollow
13,460,346FollowersFollow
6,425SubscribersSubscribe