[unable to retrieve full-text content]
Certified Cloud Security Professional (CCSP)
[unable to retrieve full-text content]
Microsoft CredSSP: How was it exploited by CVE-2018-0886?
[unable to retrieve full-text content]
federated identity management
[unable to retrieve full-text content]
Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31
Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the equipment.
Microsoft adds resiliency, redundancy, security to Windows Server 2019
With Windows Server 2019, Microsoft is adding resiliency and redundancy enhancements to the Shielded Virtual Machines security controls it introduced with Windows Server 2016. Shielded VMs originally provided a way to protect virtual machine assets by isolating them from the hypervisor infrastructure and could also help prove to auditors that systems were adequately isolated and […]
How the Spanish cybercriminal underground operates | Salted Hash Ep 30
Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.
Automation critical to scalable network security
Securing the business network has been and continues to be one of the top initiatives for engineers. Suffering a breach can have catastrophic consequences to a business, including lawsuits, fines, and brand damage from which some companies never recover. To combat this, security professionals have deployed a number of security tools, including next-generation firewalls (NGFW) […]
Supermicro is the latest hardware vendor with a security issue
Security researchers with Eclypsium, a firm created by two former Intel executives that specializes in rooting out vulnerabilities in server firmware, have uncovered vulnerabilities affecting the firmware of Supermicro servers. Fortunately, it’s not easily exploited. The good news is these vulnerabilities can be exploited only via malicious software already running on a system. So, the […]
What happens if IoT security doesn’t get solved?
Sometimes, confirmation of the obvious can be really important. At least, that’s how I felt when I saw a new Bain & Company report, Cybersecurity Is the Key to Unlocking Demand in IoT. According to the consulting firm’s survey, 45 percent of Internet of Things (IoT) buyers say “concerns about security remain a significant barrier […]