article thumbnail

Data Wallets Using the Solid Protocol

Schneier on Security

I am the Chief of Security Architecture at Inrupt, Inc. , This week, we announced a digital wallet based on the Solid architecture. Details are here , but basically a digital wallet is a repository for personal data and documents. Right now, there are hundreds of different wallets, but no standard.

article thumbnail

Metadata Left in Security Agency PDFs

Schneier on Security

Really interesting research : “Exploitation and Sanitization of Hidden Data in PDF Files” Abstract: Organizations publish and share more and more electronic documents like PDF files. All these information can be exploited easily by attackers to footprint and later attack an organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Network security architecture is a strategy that provides formal processes to design robust and secure networks. This article explores network security architecture components, goals, best practices, frameworks, implementation, and benefits as well as where you can learn more about network security architecture.

article thumbnail

Microsoft Patch Tuesday, June 2022 Edition

Krebs on Security

Dubbed “ Follina ,” the flaw became public knowledge on May 27, when a security researcher tweeted about a malicious Word document that had surprisingly low detection rates by antivirus products. “Most malicious Word documents leverage the macro feature of the software to deliver their malicious payload. .

article thumbnail

Coffee with the Council Podcast: Scoping and Segmentation: Navigating Modern Network Architecture and PCI DSS v4.x

PCI perspectives

Recently, PCI SSC published a new information supplement called PCI DSS Scoping and Segmentation Guidance for Modern Network Architectures. I'm Alicia Malone, Senior Manager of Public Relations for the PCI Security Standards Council.

article thumbnail

What is 5G security? Explaining the security benefits and vulnerabilities of 5G architecture

CyberSecurity Insiders

Defining 5G security and architecture. According to the document, 5G’s trustworthiness is made possible by a set of security features that were built using system design principles applied with a risk-based mindset. Delving into the technical details of the 5G security architecture is beyond the scope of this article.

article thumbnail

New Information Supplement: PCI DSS Scoping and Segmentation Guidance for Modern Network Architectures

PCI perspectives

The PCI Security Standards Council (PCI SSC) has published a new Information Supplement:  PCI DSS Scoping and Segmentation Guidance for Modern Network Architectures. This