A year is a long time in cybersecurity. Certainly, there are some constants. Ransomware has been a major cybersecurity issue for years, but shows… Story on ZDNet
Author: ceadmin
An Untrustworthy TLS Certificate in Browsers
The major browsers natively trust a whole bunch of certificate authorities, and some of them are really sketchy Story on Schneier on Security
How to Close Kubernetes’ Network Security Gap
To reap the full benefits of Kubernetes and microservices-based application architectures, organizations must transform how they implement security. Story on Dark Reading
6 Types of Rootkit Threats and How to Detect Them (+ Examples)
In the ever-evolving world of malware, rootkits are some of the most dangerous threats out there. Story on eSecurity Planet
What is confidential computing?
Today’s tech industry needs to always keep a step ahead of attackers. Confidential computing is a part of that conversation… Story on TechRepublic
Lenovo driver goof poses security risk for users of 25 notebook models
More than two dozen Lenovo notebook models are vulnerable to malicious hacks that disable the UEFI secure boot process… Story on Ars Technica
Microsoft’s Certificate-Based Authentication Enables Phishing-Resistant MFA
Microsoft has removed a key obstacle facing organizations seeking to deploy phishing-resistant multifactor authentication (MFA) by enabling certificate-based authentication. Story on Dark Reading
How Does DNS Telemetry Help Detect and Stop Threats?
Question: How can administrators use DNS telemetry to complement NetFlow data in detecting and stopping threats? Story on Dark Reading
Unencrypted Traffic Still Undermining Wi-Fi Security
Even cybersecurity professionals need to improve their security posture. That’s the lesson from the RSA Conference in February… Story on Dark Reading
Using Wi-FI to See through Walls
Using Wi-FI to See through Walls This technique measures device response time to determine distance. Story on Schneier on Security