April 17, 2019
Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption â such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street. Read more â¶
Why security-IT alignment still fails
How and when to set Windows logging to UTC time
Cybercrime groups raise the bar for security teams by borrowing APT techniques
FEMA contractor at center of privacy violation provides services to many other agencies
Outside-the-box malware is getting more common, security researchers warn
How to improve container security
Don't let obsolete technology get you down. Read more â¶
Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles. Read more â¶
FROM OUR BUSINESS PARTNERS
With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features. Read more â¶
As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations. Read more â¶
Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders. Read more â¶
Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk? Read more â¶
Malware authors have been experimenting with unusual malware formats, and this presents new challenges for the security industry. Read more â¶
Securing your Docker and container infrastructure will take a combination of policies, explicit tools and careful examination of your apps. Hereâs how to do it. Read more â¶
Is your enterprise IT budget stuck in the clouds? Read more â¶