How to Secure DevOps Environments: Exploring Best Practices

Hard to believe, but it’s been more than a decade since the concept of DevOps was introduced. By eliminating the silos separating software development and operations teams, and fostering a more agile, collaborative environment, DevOps promised to… Continue reading How to Secure DevOps Environments: Exploring Best Practices

Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

Summary Microsoft recently disclosed a spoofing vulnerability that enables an attacker to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. It also enables attackers to conduct man-in-the-middle network … Continue reading Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

Taking Zero Trust Network Access to The Next Level

What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred an enterprise security architecture that relied on a… Continue reading Taking Zero Trust Network Access to The Next Level

Strong Authentication for Endpoint Security: 3 Perspectives

Authentication solutions have been around for years. I actually started my cyber career working on one of the original and best two-factor (2FA) products – SecurID. Over the decades, the tech we use, the way we communicate and connect, and the th… Continue reading Strong Authentication for Endpoint Security: 3 Perspectives

Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense

Staying ahead of phishing attacks is, and likely will always be, an uphill battle. …
The post Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense appeared first on SlashNext.
The post Two-Factor Authentication (2FA) is Just… Continue reading Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense

101 AWS Security Tips & Quotes, Part 3: Best Practices for Using Security Groups in AWS

Here’s the third blog post in our 4-part series of AWS Security Tips and Quotes, which is designed to help you evolve and strengthen your organization’s security, building on a proactive, comprehensive security strategy. So far we’ve … Continue reading 101 AWS Security Tips & Quotes, Part 3: Best Practices for Using Security Groups in AWS

101 AWS Security Tips & Quotes, Part 2: Securing Your AWS Environment

As part of its mission, Threat Stack has always brought its readers security-related content to help them make informed decisions that will strengthen their organizations’ security. With more companies than ever leveraging cloud services like AWS… Continue reading 101 AWS Security Tips & Quotes, Part 2: Securing Your AWS Environment