Summer Fowler, InfoSecWorld 2018 Speaker – Enterprise Security Weekly #79

Summer has 17 years of experience in software engineering, cybersecurity, and technical management. She joins Paul and Doug this week for an interview! Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
The post Summer Fowl… Continue reading Summer Fowler, InfoSecWorld 2018 Speaker – Enterprise Security Weekly #79

BIND, Intel, and Brickerbot – Paul’s Security Weekly #544

In the news, BIND comes apart thanks to ancient denial of service vuln, Brickerbot taking out your IoT one device at a time, Intel fix causes reboots and slowdowns, WiFi alliance announces WPA3 and updates to WPA2, hackers exploiting three Microsoft Of… Continue reading BIND, Intel, and Brickerbot – Paul’s Security Weekly #544

MacOS 0-Day, Sonos, and Autofill Username and Password – Hack Naked News #155

Paul reports on a bypass flaw found in Samsung Android browser, security flaws found in Sonos Internet connected speakers, and Google wanting to get rid of SMS authentication! Jason Wood of Paladin Security joins us for the expert commentary, and more … Continue reading MacOS 0-Day, Sonos, and Autofill Username and Password – Hack Naked News #155

The Top 10, Top 10 Predictions for 2018

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Copying off since 2012, rather than thinking up my own, I figured I’d regurgitate what many others expect to happen. Top 10 C… Continue reading The Top 10, Top 10 Predictions for 2018

Getting Control of Your Cloud: 10 Predictions for 2018

Organizations that use public clouds are adopting an increasingly sophisticated approach to security. While they have become comfortable with their sensitive workloads operating in the cloud over the past few years, they also have gained a better under… Continue reading Getting Control of Your Cloud: 10 Predictions for 2018

Cloud and Hyper-V Predictions for 2018

Aidan Finn delves into the mists of the future to discover what will work and what will not in the world of Hyper-V and the Microsoft cloud in 2018.

The post Cloud and Hyper-V Predictions for 2018 appeared first on Petri.

Continue reading Cloud and Hyper-V Predictions for 2018

How the Democrats plan to stop hackers from breaching 2018 campaigns

“Never again,” says Aaron Trujillo, chief of staff for the Democratic Congressional Campaign Committee. “That’s the message.” Roughly one year ago, the DCCC — the campaign arm for Democrats in the House of Representatives — revealed that its systems were breached by hackers. The cyberattacks, as it was later reported, were connected to a broader operation that included multiple computer intrusions into the Democratic National Committee, the party’s national organization. Closer to Election Day, it was revealed that there were links between the DCCC breach incident and the GRU, Russia’s premier military intelligence agency. Russian government officials quickly denied that the Kremlin was involved in either incident. The breach marked the beginning of a larger issue. In August 2016, less than one month after the DCCC hack had been publicly disclosed, a blog written under the moniker of  “Guccifer 2.0” began publishing thousands of sensitive, internal DCCC documents. They included […]

The post How the Democrats plan to stop hackers from breaching 2018 campaigns appeared first on Cyberscoop.

Continue reading How the Democrats plan to stop hackers from breaching 2018 campaigns