Media Summary: As if Wi-Fi couldn't get anymore tedious, five (yes, FIVE) vulnerabilities were discovered in the You may have heard of "technical debt", but have you heard of " While it's certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the ...
Enterprise Linux Security Episode 44 - Detailed Analysis & Overview
As if Wi-Fi couldn't get anymore tedious, five (yes, FIVE) vulnerabilities were discovered in the You may have heard of "technical debt", but have you heard of " While it's certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the ... We've discussed supply-chain attacks in the past, and now it's time to see an actual example that happened recently. However ... If you're in charge of maintaining servers and related equipment, what should you monitor? While monitoring is something that will ... By using clever infrastructure engineering strategies to increase reliability, you can minimize disruption and downtime for your ...
When you write software, there's no reason to reinvent the wheel - shared libraries and other resources exist to enable you to ... A "researcher" with a screen name of "Sockpuppets" decides to demonstrate how insecure some specific online resources are, ... We've talked about Supply Chain Attacks on this podcast before, and in this How does perception vs reality tie into protecting our infrastructure from threat actors? In this System Administrators are the heroes we need, and in today's A multi-national effort took down a leading market for ill-gotten credentials, resulting in well over 100 arrests. This initiative was ...