Kubernetes Security – A Useful Bash One-Liner

Whether you’re an administrator, pentester, devop engineer, programmer, or some other IT person, chances are that you’ve heard of Kubernetes (k8s). If you’re a penetration tester like myself you may sometimes find yourself in odd situ… Continue reading Kubernetes Security – A Useful Bash One-Liner

Work-from-Home Security Advice

SANS has made freely available its "Work-from-Home Awareness Kit." When I think about how COVID-19’s security measures are affecting organizational networks, I see several interrelated problems: One, employees are working from their home networ… Continue reading Work-from-Home Security Advice

Work-from-Home Security Advice

SANS has made freely available its "Work-from-Home Awareness Kit." When I think about how COVID-19’s security measures are affecting organizational networks, I see several interrelated problems: One, employees are working from their home networks and sometimes from their home computers. These systems are more likely to be out of date, unpatched, and unprotected. They are more vulnerable to attack simply… Continue reading Work-from-Home Security Advice

Future of Cybersecurity Threats – Looking Ahead So We Can Prepare Now

The post Future of Cybersecurity Threats – Looking Ahead So We Can Prepare Now appeared first on CCSI.
The post Future of Cybersecurity Threats – Looking Ahead So We Can Prepare Now appeared first on Security Boulevard.
Continue reading Future of Cybersecurity Threats – Looking Ahead So We Can Prepare Now

Keeping Customer Data Secure in the Cloud: 5 Things to Know

The post Keeping Customer Data Secure in the Cloud: 5 Things to Know appeared first on CCSI.
The post Keeping Customer Data Secure in the Cloud: 5 Things to Know appeared first on Security Boulevard.
Continue reading Keeping Customer Data Secure in the Cloud: 5 Things to Know

Ransomware attack forces 2-day shutdown of natural gas pipeline

The attacker(s) infected both IT and operational networks with an unspecified ransomware strain, though the facility never lost control. Continue reading Ransomware attack forces 2-day shutdown of natural gas pipeline

Endpoint Detection and Response: Securing Your Borders

The post Endpoint Detection and Response: Securing Your Borders appeared first on CCSI.
The post Endpoint Detection and Response: Securing Your Borders appeared first on Security Boulevard.
Continue reading Endpoint Detection and Response: Securing Your Borders