Foundational Security Operations Concepts
The certified information systems security professional (CISSP) certification is a prestigious qualification for professionals working in the field of cybersecurity. The certification requires an...
View ArticleParsix GNU/Linux 8.15 and 8.10 Users Receive New Security Updates from Debian
The Christmas celebrations are now over, so is the New Year's holiday, and the Parsix GNU/linux developers are back, porting the latest security updates from the upstream Debian GNU/Linux repositories....
View ArticleError 17836 Length specified in network packet payload did not match number...
Question:This error appeared in the SQL Server Logs today. Error: 17836, Severity: 20, State: 14. Length specified in network packet payload did not match number of bytes read; the connection has been...
View Article逆向分析加固 apk 的完整过程
10 Jan 2017 - niexinming [+] Author: niexinming [+] Team: n0tr00t security team [+] From: http://www.n0tr00t.com [+] Create: 2017-01-10 此次逆向的 apk 为 tmri_10101_1461033981072_release.apk (pass: 3qun)...
View ArticleNetflix Users Under Attack as Hackers Try to Steal Credit Card Info
Security company FireEye detected a new wave of attacks aimed at Netflix users, with cybercriminals now turning to phishing schemes in order to steal their personal information, including credit card...
View ArticleFiltering and Auditing within Log Insight
The article below describes one of the ways to implement vSphere Log Insight into an environment where a (security departments) syslog server is already available and where this server ideally only...
View Article7 Tips to Improve WordPress Security
You just spent many days and sleepless nights to make a blog on WordPress or simply aWordPress website. Now that it is up and running, you are on cloud nine. What if, without a moment’s notice,it goes...
View ArticleToward Better Security and Governance With Blockchain
Valery Vavilov is the CEO and founder of Bitfury Group, a leading blockchain company that delivers software, hardware, mining and consulting solutions focused on the technology. In this CoinDesk 2016...
View Article3 Ways to Make Information Security a Habit During Project Management
With eyeballs rolling, they mumble, “Why do security people insist on stopping our projects?” As information security (IS) professionals, we have seen this response from project managers (PM),...
View Article//No Comment - Let's Encrypt, IoT Security & Obfuscation
Authentication Protocols for Internet of Things: A Comprehensive Survey Obfuscation using Encryption Sometimes the news is reported well enough elsewhere and we have little to add other than to bring...
View Article5 Key Elements of Digital Payment Systems
In this post, we explain in detail why these five key elements will either make or break digital banks and e-wallets. 1. Security General populace equates the institution of banks with the matter of...
View ArticleStolen details of 3.3m Hello Kitty fans including kids published online
Remember that 3.3 million database of Hello Kitty fans that gotexposed about a year ago?Make that exposed, stolen and published online one year later. In December 2015, Sanrio the company behind the...
View ArticleNew security concerns due to business complexities
It is estimated that in 2016, more than $94 billion will be invested in security solutions, per industry analyst forecasts, yet nearly half of organizations report having had a breach either internal...
View ArticleDo we really need higher education to solve our perceived and actual security...
I remain an outspoken critic of the notion that we have an actual critical skills shortage. I accept that some folks have a tough time finding and retaining the talent they seek. Lost in the discussion...
View ArticleFirebase Security Rules
Firebase Realtime Database security rules are how you secure your data from unauthorised users and protect your data structure. In this quick tip tutorial, I will explain how to configure your database...
View ArticleBeyondCorp is security for the Cloud Native organization
The term Cloud Native usually references application-centric tools and patterns, so what does it mean to be a Cloud Native organization? It begins with the awareness that being a software company goes...
View ArticleDarktrace Automates Network Security Through Machine Learning
Darktrace co-founder Poppy Gustafsson recently predicted, at TechCrunch Disrupt London , that malicious actors will increasingly use artificial intelligence to create more sophisticated spearphishing...
View Article20 Tools to Boost Security at Your Small Business While on a Budget
The prevalence of digital technology has made small business owners keenly aware of the security threats they face. However, it is just as important for them to be aware of the physical security...
View Article取势合众•驭未来 亚信安全2017合作伙伴峰会隆重召开
距亚信安全全盘接手趋势科技中国区业务已经一年有余,在走过“融合、突破”的元年之后,这艘云与大数据安全技术的“中国航母”,在2017年又当如何拉响起航的汽笛呢?...
View ArticleCybersecurity predictions for 2017
“Prophesy is a good line of business, but it is full of risks,” as Mark Twain wrote. Looking back at the predictions we made at thestart of 2016, I think many of them did in fact come true: cloud...
View Article