New Cyber Security Style Guide helps bridge the communication gap
Poor communication is a security flaw. Time to patch.
J.M. Porup | 02 Mar | Read more
Poor communication is a security flaw. Time to patch.
J.M. Porup | 02 Mar | Read more
A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University.
J.M. Porup | 28 Feb | Read more
SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and sanitize your database inputs.
J.M. Porup | 26 Feb | Read more
Shiny buttons that go "ping!" considered harmful.
J.M. Porup | 17 Feb | Read more
Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective?
J.M. Porup | 09 Feb | Read more
Qubes OS defends at-risk enterprise users from targeted attacks, as well as drive-by malware and the Meltdown exploit.
J.M. Porup | 02 Feb | Read more
To few eyeballs on code is a security issue. Can FreeBSD, OpenBSD, and NetBSD survive?
J.M. Porup | 25 Jan | Read more
Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.
J.M. Porup | 23 Jan | Read more
Mudge's Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.
J.M. Porup | 18 Jan | Read more
You need to apply Meltdown and Spectre patches to pretty much everything in your enterprise. And you need to start now. We help you prioritize.
J.M. Porup | 10 Jan | Read more
Android and iOS devices are vulnerable to the latest hardware security flaw, and not all are easily patched. The good news: Exploits are hard (maybe) and so far none are known.
J.M. Porup | 06 Jan | Read more
Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.
J.M. Porup | 27 Dec | Read more
AWS's new GuardDuty and Macie offerings unleash the power of machine learning to secure your data. Are they right for your enterprise?
J.M. Porup | 18 Dec | Read more
Some information security insiders raised a red flag when Russian requests to review security software code became known. The controversy may be a tempest in a teapot.
J.M. Porup | 11 Dec | Read more