OneLogin’s security breach revealed their Secure Notes we’re unencrypted in OneLogin’s logs. Here’s some things to think about when using similar products, and when building encryption and logging controls.
Watch more videos on my YouTube channel.
OneLogin’s security breach revealed their Secure Notes we’re unencrypted in OneLogin’s logs. Here’s some things to think about when using similar products, and when building encryption and logging controls.
Watch more videos on my YouTube channel.
Media like television and movies inspires a certain set of criminals. Take, for example, the ransomware variant based on EDA2 and sporting the FSociety logo.
Watch more videos on my YouTube channel.
Being careful with what we post online, and our employees post online. Also, guidance on security awareness training.
Watch more videos on my YouTube channel.
They say never trust anyone over thirty. I said never trust any domain name younger than thirty. Well, thirty days, anyways. Here’s why.
Watch more videos on my YouTube channel.
Using Realtime Application Security Protection, or RASP, in conjunction with Web Application Firewalls for virtual patching until developers can fix the problem.
Watch more videos on my YouTube channel.
What are the attributes of great business continuity exercises?
Watch more videos on my YouTube channel.
Aligning security architecture with risk management framework, enterprise architecture, and application vendor practices.
Watch more videos on my YouTube channel.
Automating security tasks using If This Then That (IFTTT) along with Python or Bash scripts.
Watch more videos on my YouTube channel.
Stopping distributed denial of service attacks with load balancers, its more than simply stacking on more Web servers.
Watch more videos on my YouTube channel.
IT security communities: join one, or build one. Don’t go it alone.
Watch more videos on my YouTube channel.