| Security Blog News |
| Showing 'Security Blog News' from 11 to 20|
| |Phoning Home: Your Latest Data Exfiltration Headache Companies phone enterprise customer data home securely and for a variety of perfectly legitimate and useful reasons. The problems stem from insufficient disclosure.
| |How To Protect Yourself And Your Organization Against Digital Identity Fraud Captured through malware and sold on the Dark Web, the "digital fingerprints" of your web browsing can be used to impersonate your identity online, as described in a new report from IntSights.
| |Protecting Chrome Users In Kazakhstan Posted by Andrew Whalley, Chrome SecurityWhen making secure connections, Chrome trusts certificates that have been locally installed on a users computer or mobile device. This allows users to run tools to inspect and debug connections during...
| |How Google Adopted BeyondCorp: Part 2 (devices) Posted by Matt McDonald, Software Engineer, and Sebastian Harl, Software EngineerIntro This is the second post in a series of four, in which we set out to revisit various BeyondCorp topics and share lessons that were learnt along the internal...
| |Who Gets Privileged Access & How To Enforce It Lets begin by re-evaluating IT infrastructures to determine who has access to what, why, and when.
| |Microservices: A Double-Edged Sword As modern application development trends go, distributed microservices architecture has been one of the most popular and successful in recent memory. The reason is simple. Breaking up the design of an application into smaller pieces and...
| |Famous Con Man Turned Cybersecurity Expert Urges Credit Freezing Con man turned Leonardo DiCaprio movie character turned cybersecurity expert, Frank Abagnale, talks with TechRepublics Karen Roby about the steps people can take to protect their identity.
| |How To Avoid .JSE Ransomware That Hit The Texas Government A coordinated ransomware attack hit 23 local Texas governments encrypts files and adds a .JSE extension at the end. Heres how to prevent an attack.
| |Tough Love: Debunking Myths About DevOps & Security Its time to move past trivial shift left conceptions of DevSecOps and take a hard look at how security work actually gets accomplished.
| |How To Use Advanced Configurations Of Apples Content Cache Service The macOS content cache services default configurations arent one-size-fits-all. Learn how to use Apples advanced configurations to adapt to any enterprise network.
| « Newer 1 2 3 4 5 6 7 8 9 10 Older » |