BSides Vancouver 2021 – Vivek Ponnada’s ‘Is The Power Grid A Huge Cybersecurity Risk?’

Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups’ YouTube channel.
Permalink
The post BSides Vancouver 2021 – Vivek Ponnada’s ‘Is The Power Grid A Huge Cybersecurit… Continue reading BSides Vancouver 2021 – Vivek Ponnada’s ‘Is The Power Grid A Huge Cybersecurity Risk?’

BSides Vancouver 2021 – Ruchi Gautam’s ‘Privacy Concerns In The Connected Car Ecosystem’

Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups’ YouTube channel.
Permalink
The post BSides Vancouver 2021 – Ruchi Gautam’s ‘Privacy Concerns In The Connected Car … Continue reading BSides Vancouver 2021 – Ruchi Gautam’s ‘Privacy Concerns In The Connected Car Ecosystem’

Hackers Exploit the COVID-19 Pandemic for Cyber Scams

Cyber criminals are taking advantage of the global crisis coronavirus pandemic (COVID-19) to attempt cyber scams! The Wave of Coronavirus Cyber Scams While the world is busy fighting with the coronavirus pandemic (COVID-19), cyber attackers are misusin… Continue reading Hackers Exploit the COVID-19 Pandemic for Cyber Scams

Directives Issued After US Pipeline Ransomware Attack

In the wake of the terrible ransomware attack that targeted one of the most important fuel pipelines of the US, the Department of Homeland Security (DHS) has mandated additional cyber security measures. This is the second security directive issued by t… Continue reading Directives Issued After US Pipeline Ransomware Attack

BSides Vancouver 2021 – Chris Timmons’s ‘So You Cracked A Bunch Of Passwords. Now What?’

Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups’ YouTube channel.
Permalink
The post BSides Vancouver 2021 – Chris Timmons’s ‘So You Cracked A Bunch Of Passwords. … Continue reading BSides Vancouver 2021 – Chris Timmons’s ‘So You Cracked A Bunch Of Passwords. Now What?’

Essential Protection for Legacy Applications – Part 1

Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective protection of legacy applications is a rich and complex topic that we will detail in a series of blog… Continue reading Essential Protection for Legacy Applications – Part 1

BSides Vancouver 2021 – Dolev Farhi’s ‘Damn GraphQL – Defending And Attacking APIs’

Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups’ YouTube channel.
Permalink
The post BSides Vancouver 2021 – Dolev Farhi’s ‘Damn GraphQL – Defending And Atta… Continue reading BSides Vancouver 2021 – Dolev Farhi’s ‘Damn GraphQL – Defending And Attacking APIs’

A Cure for a Disheartened Cybersecurity Professional

Data breaches and ransomware attacks aren’t just still occurring. They’re also becoming more frequent. According to ZDNet, the number of ransomware attacks detected and blocked by one security firm grew 715% year-over-year in 2020 alone. Another securi… Continue reading A Cure for a Disheartened Cybersecurity Professional

BSides Vancouver 2021 – Petr McAllister’s ‘How To Secure Microservices Without Traditional Firewall’

Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups’ YouTube channel.
Permalink

The post BSides Vancouver 2021 – Petr McAllister’s ‘How To Secure Microservices With… Continue reading BSides Vancouver 2021 – Petr McAllister’s ‘How To Secure Microservices Without Traditional Firewall’

BSides Vancouver 2021 – Filipi Pires’ ‘Discovering C&C In Malicious PDF With Obfuscation, Encoding And Other Techniques’

Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups’ YouTube channel.
Permalink
The post BSides Vancouver 2021 – Filipi Pires’ ‘Discovering C&C In Malicious PDF Wi… Continue reading BSides Vancouver 2021 – Filipi Pires’ ‘Discovering C&C In Malicious PDF With Obfuscation, Encoding And Other Techniques’