Two-factor authentication is a simple security measure, right? What if you could take that and build on it to the point where it becomes a huge piece of your overall security posture? Tom Hollingsworth takes a look at Cisco’s recent Duo acquisition and how it can be leveraged for more than just a few factors.
Data protection can mean making sure you have adequate copies to ensure integrity and uptime. But after Australia passed the Telecommunications Access and Assistance Bill, requiring encryption backdoors, Preston de Guise wonders if it’s possible maintain the privacy function of data protection.
According to a recent audit, the Army, Navy, and Missile Defense Agency are having some issues with basic security. How bad is it? [I]nvestigators found that many users did not enable multifactor authentication for their accounts Ok, that’s not great. [T]he network was never configured to support multifactor authentication at all. Gulp Investigators found that […]
Cheap, tiny, and full-featured SoCs are great tools for exploring creativity. But those same features also make them great tools to malicious actors. The recent DarkVishnya attacks in Eastern Europe saw them used to gain local access to banking information.
Bruce Schneier digs into some commonly tossed around consumer security tips. He digs into what can actually work, what is flat out bad advice, and what is probably overkill.
Security in networking is a huge undertaking. You have to know what you need to know before you ever start implementation. Orhan Ergun takes a look at some of the important pieces of security in networking, specifically in SD-WAN, to help you figure out where to start before you get started.
The first major security flaw for Kubernetes has been found. It’s a nasty privilege escalation that’s tough to detect. Let the patching begin!
Security is a complicated thing to deal with in the modern world. What we need now more than anything is education about what we face. Tom Hollingsworth takes a look at some of the things that impact our secure world and an upcoming event that can shed some light on how to face those challenges.
Security has a huge impact on your WAN strategy. This becomes even more apparent when you move to an SD-WAN architecture. Jed Casey takes a look at some of the things you need to consider when looking at SD-WAN security.
Germany has published a draft outline security rules for SOHO routers. We dig into some of the peculiarities of the rules, and what might have been left out.