Security

Share
  • Ransomware: Do you pay the ransom? | Salted Hash Ep 19
    on February 19, 2018 at 11:30 am

    Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. […]

  • Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18
    on February 12, 2018 at 12:00 pm

    Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the world. […]

  • Spectre and Meltdown | Salted Hash Ep 17
    on February 6, 2018 at 12:00 pm

    What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws. […]

  • Get 3 Years of NordVPN Service for Just $2.75 Per Month
    by DealPost Team on February 2, 2018 at 3:43 pm

    NordVPN promises a private and fast path through the public internet, with no logs and unmetered access for 6 simultaneous devices. They are currently running a promotion, but you'll have to use this link to find it. Its typical price has been discounted to $99 for 3 years of service. That's a good […]

  • Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16
    on January 29, 2018 at 11:30 am

    CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline. […]

  • Tech Talk: IT trends for 2018 – passwords on the way out, blockchain evolves
    on January 26, 2018 at 7:30 pm

    Our tech panel envisions the end of passwords, looks at how blockchain is evolving, details why 'serverless' computing is a boon to devs and wonders why Apple's HomePod seems late to the game. […]

  • Tech Talk: The beginning of the end of the password in 2018
    on January 26, 2018 at 5:00 am

    Hackers can crack them, and users are careless with them. Passwords have long been problematic, but they are getting renewed attention after a series of major breaches. Our panelists look at the coming technology to help with password security. […]

  • Mingis on Tech: 2018 – the year blockchain breaks out
    on January 23, 2018 at 7:15 pm

    Blockchain continues to evolve and grow, as more companies test it out. It's now seen as the heart of a new global shipping platform that could save companies billions of dollars and as the underpinning for a P2P cloud storage endeavor. […]

  • Get 29% Off This 6-Sheet Micro-Cut Paper and Credit Card Shredder
    by DealPost Team on January 22, 2018 at 3:08 pm

    This powerful micro-cut shredder from AmazonBasics turns a letter-sized sheet into 2,235 pieces of confetti, up to 6 sheets at a time (5/32 by 15/32 inches; security level P-4). Inserted one at a time, it also destroys credit cards, rendering them completely unusable. It features a generous […]

  • The people you call when you've had a breach | Salted Hash Ep 15
    on January 22, 2018 at 2:00 pm

    Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018. […]

  • Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14
    on January 15, 2018 at 2:00 pm

    Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done. […]

  • DJI's bounty problems and video surveillance programs | Salted Hash Ep 13
    on January 8, 2018 at 2:00 pm

    Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid. […]

  • Enterprise IoT threatens to undermine cloud and IT security
    by David Linthicum on January 5, 2018 at 11:00 am

    The internet of things, or IoT, is pervasive these days in your personal life. However, this technology is just getting into the Global 2000 companies. Yet most of the Global 2000 companies are unaware of the risks that they are bringing to IT and cloud security with their IoT adoption.How did this […]

  • 32% off Kidde Carbon Monoxide Alarm with Display and 10 Year Battery - Deal Alert
    by DealPost Team on January 4, 2018 at 12:00 pm

    Carbon Monoxide is odorless, tasteless and invisible, and it accounts for over 72,000 cases of poisoning each year. Kidde calls their C3010D model "worry free" because its sensor and sealed battery provide 10 years of uninterrupted CO detection, and a digital display that updates every 15 […]

  • 30% off APC 1500VA Compact UPS Battery Backup & Surge Protector
    by DealPost Team on December 18, 2017 at 2:33 pm

    An APC UPS provides backup power power and surge protection to power and protect your PC or Mac, network router, gaming consoles like Xbox and PS4, AV and other business electronics from the dangers of power surges, spikes, lightning and power outages. By powering your critical electronics with a […]

  • IDG Contributor Network: 3 predictions for devsecops in 2018
    by Amir Jerbi on December 15, 2017 at 8:25 pm

    Tech predictions: Love them or hate them, they are a time-honored tradition, one that provides the opportunity to reflect on the year passed and prepare for the year ahead. 2017 was a good year for devsecops—this year it evolved from a semi-obscure concept to a viable enterprise […]

  • Q&A: How do good containers go bad?
    by Kathryn Cave on December 7, 2017 at 1:30 am

    Recently Tim Mackey, technical evangelist for open source security company Black Duck Software, spoke at London’s DevSecCon about “When Good Containers Go Bad”. In the following lightly edited Q&A we pick his brains on the subject.To read this article in full, please click […]

  • What’s new in PHP 7.2: better security, code handling
    by Paul Krill on December 1, 2017 at 11:00 am

    PHP 7.2, the latest version of the popular server-side web development language, has numerous features and fixes.The November 30, 2017, release is the second feature update to the PHP 7 series. PHP 7.0 debuted in December 2015 to much fanfare, with the upgrade offering double the performance of […]

  • 11% off August Smart Lock Pro With Connect Bundle - Deal Alert
    by DealPost Team on November 15, 2017 at 2:46 pm

    With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading […]

  • IDG Contributor Network: KPIs for managing and optimizing devsecops success
    by Amir Jerbi on November 13, 2017 at 8:10 pm

    Back in 2012, in a report called “DevOpsSec: Creating the Agile Triangle,” Gartner identified the need for information security professionals to become actively involved in devops initiatives. Five years and more than 24 billion Docker image pulls later, that need is now a full-blown […]

  • 15% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert
    by DealPost Team on November 8, 2017 at 1:35 pm

    Be it a lightning strike that destroys a home entertainment center or consistently fluctuating power that degrades the performance and shortens the life of your electronics – surges, lightning, and other power disturbances can have a devastating impact on the valuable electronics you rely on […]

  • Google can read your corporate data. Are you OK with that?
    by David Linthicum on November 3, 2017 at 10:00 am

    On Halloween, Google told its Google G Suite users that “this morning, we made a code push that incorrectly flagged a small percentage of Google Docs as abusive, which caused those documents to be automatically blocked. A fix is in place and all users should have full access to their […]

  • 4 extra-strength container security tools for Docker and Kubernetes
    by Serdar Yegulalp on October 25, 2017 at 10:00 am

    Docker-style containers aren’t just a way to deploy software more quickly or flexibly. They can also be a way to make software more secure. Automatic analysis of the software components that go into containers, behavioral policies that span container clusters and multiple application […]

  • How containers and microservices change security
    by Wei Lien Dang on October 18, 2017 at 10:00 am

    Wei Lien Dang is VP of product at StackRox.Today organizations large and small are exploring the adoption of cloud-native software technologies. “Cloud-native” refers to an approach that packages software within standardized units called containers, arranges those units into […]

  • Devsecops: Add security to complete your devops process
    by David Linthicum on October 17, 2017 at 10:00 am

    As seen in a recent DigiCert report, an overwhelming majority of companies believe that an integrated security and devops team makes sense. In fact, 98 percent of survey 300 US respondents (a third from IT or security) are either planning to or have already launched such an effort.This is good, if […]

  • What is Grafeas? Better auditing for containers
    by Serdar Yegulalp on October 13, 2017 at 10:00 am

    The software we run has never been more difficult to vouchsafe than it is today. It is scattered between local deployments and cloud services, built with open source components that aren’t always a known quantity, and delivered on a fast-moving schedule, making it a challenge to guarantee […]

  • Centralized security in the cloud is the best security model
    by David Linthicum on October 13, 2017 at 10:00 am

    It’s 6:00 a.m. on a Monday morning. You get an automated text from your security systems that a DDOS attack was attempted, but new security policies downloaded several hours earlier proactively protected the systems from the attacking IP address. All is well. The alternative is not […]

  • Bossie Awards 2017: The best networking and security software
    by Fahmida Y. Rashid, Victor R. Garza on September 27, 2017 at 10:00 am

    The best open source networking and security softwareImage by IDGWe seem to be witnessing a renaissance in open source security. Security projects swarmed the Bossies last year, and the hits kept coming in 2017. Along with the many cool tools for security pros, our winners include software that […]

  • Bossies 2017: The Best of Open Source Software Awards
    by Doug Dineley on September 27, 2017 at 10:00 am

    Open source software isn’t what it used to be. The term used to conjure images of the lone developer, working into the night and through weekends, banging out line after line of code to scratch a personal itch or realize a personal vision. But with each passing year—and every new survey […]

  • Manage access control using Redis Bitfields
    by Kyle J. Davis on September 20, 2017 at 10:00 am

    Kyle Davis is the technical marketing manager at Redis Labs.One of the hardest parts about writing a user-facing app or service is controlling access to resources. Decisions about access control are some of the earliest to be made and can make or break an entire platform. It’s usually a […]

Share