Was the Raspberry Pi-related NASA JPL network breach primarily caused by the failure to keep an updated list of authorized devices?

The question What information was stolen from JPL during the Raspberry Pi hack? refers to an event in recent news (e.g. Engadget’s A rogue Raspberry Pi helped hackers access NASA JPL systems) and references NASA’s Office of I… Continue reading Was the Raspberry Pi-related NASA JPL network breach primarily caused by the failure to keep an updated list of authorized devices?

Who’s Responsible for a Cloud Breach? It Depends

The Cloud Security Alliance (CSA) released a survey earlier this year that focuses on who should take responsibility for breaches in the cloud. It’s a good question. The advent of hybrid IT, among other things, has done much to destroy our traditional… Continue reading Who’s Responsible for a Cloud Breach? It Depends

How does Software Defined Perimeter (SDP) protect against certains attack that happen in the browser?

I have been doing a bit of research on SDP (Software Defined Perimeter) but it’s still a bit unclear to me how it protects against certain types of attacks.

On Wikipedia it says that it can protect against these attacks:

cross-site scri… Continue reading How does Software Defined Perimeter (SDP) protect against certains attack that happen in the browser?