Hashing Functions – CISSP Domain 3

Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK).  There is often some confusion between hashing, encryption, and encoding, so one of the purposes of this article… Continue reading Hashing Functions – CISSP Domain 3

Skimmers in Images & GitHub Repos

MalwareBytes recently shared some information about web skimmers that store malicious code inside real .ico files.
During a routine investigation, we detected a similar issue. Instead of targeting .ico files, however, attackers chose to inject content… Continue reading Skimmers in Images & GitHub Repos

Waving the White Flag: Why InfoSec should stop caring about HTTPOnly

As a company that is constantly working with our penetration testing clients on understanding where they should focus their efforts, qualifying risk is second-nature to us. On one hand, we never want to undersell a risk, and have a client accept that r… Continue reading Waving the White Flag: Why InfoSec should stop caring about HTTPOnly

The Enemy Within: How Insider Threats Are Changing

Insider-threat security experts unravel the new normal during this time of remote working, and explain how to protect sensitive data from this escalating risk. Continue reading The Enemy Within: How Insider Threats Are Changing

Does JumpCloud Have Training?

JumpCloud University gives IT admins the tools they need to succeed with their cloud directory service. Try JumpCloud free today.
The post Does JumpCloud Have Training? appeared first on JumpCloud.
The post Does JumpCloud Have Training? appeared first … Continue reading Does JumpCloud Have Training?

Dangerous Website Backups

It’s a well-known fact that website backups are important for mitigating a plethora of site issues. They can help restore a site after a compromise or even facilitate the investigative process by providing a clean code base to compare the curren… Continue reading Dangerous Website Backups

Einstein Told Us: Why User Awareness is NOT the right focus

“The definition of insanity is doing the same thing over and over again and expecting different results.” – Einstein (Well, not really!) Every day we hear another reason why user awareness (or better-named security awareness) is criti… Continue reading Einstein Told Us: Why User Awareness is NOT the right focus

MY TAKE: Remote classes, mobile computing heighten need for a security culture in K-12 schools

Parents have long held a special duty to protect their school-aged children from bad actors on the Internet.
Related: Mock attacks help schools defend themselves
Now COVID-19 has dramatically and permanently expanded that parental responsibility, as we… Continue reading MY TAKE: Remote classes, mobile computing heighten need for a security culture in K-12 schools