Analyzing the Security Management of Docker
It’s the holiday season, which means that many of us are already in the process (or soon will be) of putting up holiday decorations. Ordinarily that wouldn’t be particularly noteworthy…
It’s the holiday season, which means that many of us are already in the process (or soon will be) of putting up holiday decorations. Ordinarily that wouldn’t be particularly noteworthy…
China-based attackers are back in the news again, this time for breaching the federal weather network, officials told the Washington Post. The initial intrusion appears to have occurred late September,…
The Federal Bureau of Investigation is investigating a cyber attack earlier this year against the U.S. Postal Service that exposed the personal information of every single employee. Personal information of…
What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers…
Another industry alliance joined the chorus urging businesses that process debit and credit cards to implement EMV payment chip technology to combat fraud. EMV stands for Europay, MasterCard® and Visa®, the…
It’s a fact of life that most IT shops have, to one degree or another, a “security products graveyard” – i.e. security technology that’s past its prime, performing poorly, or…
The current flurry of breakups in the tech sector is gratifying to watch. The only conglomerate strategy I have ever seen work effectively is Alfred P. Sloan’s revolutionary “centralized decentralization”…
High-level strategies for defending against attacks to steal identities are twofold: solutions on the back end, and what consumers and business partners can do to protect themselves. Almost daily, we…
By now you have heard about a new bug in one of the most popular Unix shell programs, the Bourne Shell, or bash. If you run Mac OSX you probably…
Security is the pursuit of perfect protection through ongoing tightening of defenses and preemptive activities to cover vulnerabilities. Risk management, on the other hand, is a discipline that enables organizations…