A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows. SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners. [ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled […]
How can cryptojacking attacks in Chrome be stopped?
[unable to retrieve full-text content]
How to stop malicious browser add-ons from taking root
[unable to retrieve full-text content]
What are the implications of DNS over HTTPS for privacy?
[unable to retrieve full-text content]
The aftermath of the Gentoo GitHub hack
Gentoo GitHub hack: What happened? Late last month (June 28), the Gentoo GitHub repository was attacked after someone gained control of an admin account. All access to the repositories was soon removed from Gentoo developers. Repository and page content were altered. But within 10 minutes of the attacker gaining access, someone noticed something was going […]
What effect does GDPR have on the WHOIS database?
[unable to retrieve full-text content]
How did an old, unpatched Firefox bug expose master passwords?
[unable to retrieve full-text content]
While no one was looking, California passed its own GDPR
The European Union’s General Data Protection Regulation (GDPR) is widely viewed as a massively expensive and burdensome privacy regulation that can be a major headache and pitfall for American firms doing business in Europe. Many firms, including Facebook, have sought ways around the law to avoid having to deal with the burden of compliance. Well, […]
Pulse Secure VPN enhanced to better support hybrid IT environments
The workplace is changing rapidly as employees embrace mobility, applications are in the cloud, and Internet of Things (IoT) devices are instrumented for continuous connectivity — and this is affecting how organizations must think about secure access. Regardless of the scenario, organizations want solutions that deliver better productivity for whomever (or whatever) is connecting, a […]
The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34
In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.