The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.
Without an active SSL certificate, user contact with the website is no longer secured, making it possible for any malicious entity to access private user information. Users are unlikely to return to the website after viewing a security notice, though. The simplest way to monitor the expiration of your site certificates is to use an efficient, automatic SSL certificate expiry monitoring solution.
In some respects, security and reliability are competing priorities. Security controls may reduce reliability, and responding to security incidents may require mission-critical systems to be paused or shut down until they're secure. The recent security incident involving CircleCI, however, shows that it's not always necessary to choose between prioritizing security or reliability.
When people think of home security they usually think of an alarm system with a keypad next to the door. These days, however, home security should have two meanings. I’m here to talk about the second: cybersecurity. In other words, security in the smart home.
DevSecOps–short for development, security, and operations–is a trending practice that introduces security testing, triage, and risk mitigation as early as possible in the software development lifecycle, rather than bolting on security in the final stages. DevSecOps requires a shift (also known as “shift-left”) in culture, process, and tools across development, security, and operations teams to make security a shared responsibility.
Yesterday, CircleCI, a Continuous Integration/Continuous Delivery (CI/CD) service, notified the world it had been breached via a critical advisory from its CTO. As a major software delivery pipeline service, CircleCI users store myriad credentials for various services in CircleCI’s “Secrets Store” infrastructure.
Digital technologies have emerged as the most fundamental tools for the survival of businesses in the fiercely-competitive modern marketplace. Implementation of modern technologies helps achieve the most desirable business objectives. However, the adoption of innovations to facilitate digital transformation also brings cybersecurity challenges too.
It is no surprise that cybercriminals are after the money, and banks have plenty lying around. They also have gobs of data, making banks irresistible to hackers who have a field day attacking complex banking IT systems flush with more connections than a movie agent. Here are a few recent facts to know.
If you watched Mission Impossible: Rogue Nation, you probably remember the infamous Gait Analysis access control system. After the agent passes the main gate, enters the elevator with fingerprint recognition, and opens three unique-combination locks, he goes through a camera-based system that recognizes how he walks, talks, and moves his face.