6 Cloud Security Resources that You Should Be Using

It’s easy to get overwhelmed with the number of cloud security resources available. How do you know which sources to trust? Which ones should inform your security strategies? Which reports will actually improve your cloud security posture? Let’s first … Continue reading 6 Cloud Security Resources that You Should Be Using

Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability

The post Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability appeared first on Digital Defense, Inc..
The post Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability appeared first on Security Boulevard.
Continue reading Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability

Zyxel Hardcoded Backdoor Account Vulnerability

The post Zyxel Hardcoded Backdoor Account Vulnerability appeared first on Digital Defense, Inc..
The post Zyxel Hardcoded Backdoor Account Vulnerability appeared first on Security Boulevard.
Continue reading Zyxel Hardcoded Backdoor Account Vulnerability

Expert Thoughts on How Infosec Pros Can Make the Most of Working From Home

We find ourselves in strange times. In response to the ongoing coronavirus epidemic, organizations have swiftly closed their offices and mandated that all employees begin working from home. This development has created security challenges with which ma… Continue reading Expert Thoughts on How Infosec Pros Can Make the Most of Working From Home

3D Printering: Getting Started Is (Still) Harder Than It Needs To Be

Stop me if this sounds familiar. You are interested in 3D printing but lacked a clear idea of what was involved. Every time you looked into it, it returned to the back burner because after spending your limited free time researching, it still looked like a part time job just …read more

Continue reading 3D Printering: Getting Started Is (Still) Harder Than It Needs To Be

Ask Hackaday: Managing Inspiration

For most of us, hacking is a hobby, something to pass a few idle hours and satisfy our need to create. Precious few of us get to live the dream of being paid to tinker; most of us need some kind of day job to pay the bills and support our hacking habits. This necessarily creates an essential conflict, rooted in the fact that we all only have 24 hours to spread around every day: I need to spend my time working so I can afford to hack, but the time I spend working to earn money eats away at …read more

Continue reading Ask Hackaday: Managing Inspiration

Recommended Reading: Serverless Security, Application Security and Other Serverless Related Topics

From time to time, I’m getting asked to recommend books, articles, blog posts or conference talks related to AWS lambda security, serverless security, application security, and security testing. I decided to put my list of recommendations in… Continue reading Recommended Reading: Serverless Security, Application Security and Other Serverless Related Topics