January, 2014

article thumbnail

Kali Linux Amazon EC2 AMI

Kali Linux

Kali Linux in the Amazon EC2 Marketplace EDIT : For updated Kali Rolling images in the Amazon AWS, check this post. After several weeks of “back and forth” with the Amazon EC2 team, Kali Linux has finally been approved into the Amazon EC2 marketplace. This means that our users can now activate and access Kali Linux instances in the Amazon cloud quickly and easily.

article thumbnail

Phone screen size: bigger isn't always better

Elie

Marketers agree: screen size is a top priority for anyone shopping for their next cell phone but my new consumer survey challenges this conventional wisdom.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerability Remediation Process & Management: Why is Remediation so Difficult?

NopSec

Note: This article was updated in June 2022. Risk Based Vulnerability management is the ongoing practice of detecting, classifying, prioritizing, and remediating security vulnerabilities in IT infrastructure and applications. For many companies, the remediation stage is where disappointment and frustration can set in. Prioritizing vulnerability remediation is the only surefire way to significantly reduce the risk of a cyber-attack.

article thumbnail

Obama’s European Privacy Headache

Privacy and Cybersecurity Law

Since the revelations of Edward Snowden, there has been a wave of data privacy repercussions in Europe. Snowden, the former […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Passing the Hash with Remote Desktop

Kali Linux

Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in Kali Linux. An example of easy command line access using pth-winexe is shown below. We constantly strive to include new, useful tools to our repositories.

article thumbnail

How to Nuke your Encrypted Kali Installation

Kali Linux

There’s been a fair amount of discussion around the recently introduced LUKS nuke patch we added to the cryptsetup package in Kali Linux. We wanted to take this opportunity to better explain this feature, as well as demonstrate some useful approaches which are worthwhile getting to know. LUKS Nuke in a Nutshell As explained well By Michael Lee in his ZDNet article , when creating an encrypted LUKS container, a master key is generated at random.

More Trending

article thumbnail

Emergency Self Destruction of LUKS in Kali

Kali Linux

Kali Linux Full Disk Encryption As penetration testers , we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensitive materials. Setting up full disk encryption with Kali is a simple process. The Kali installer includes a straightforward process for setting up encrypted partitions with LVM and LUKS.

article thumbnail

4 Things to Consider When Outsourcing Vulnerability Management

NopSec

Security risks to information systems and sensitive data are expanding at a rate that can outpace an organization’s technical resources and expertise. Small to mid-sized companies without sufficient in-house resources to maintain an effective security program may consider outsourcing cyber-security to a managed security service provider (MSSP). Knowing exactly what security functions to outsource is a key decision.

article thumbnail

The Year Ahead for Vulnerability Management

NopSec

This is the time of year when companies gaze into their crystal ball and try to discern what lies ahead. And nobody is better at predictions than an industry analyst. Javvad Malik is a Senior Analyst for the Enterprise Security Practice at 451 Research. He recently posted a tongue-in-cheek video “2014 Information Security Predictions” on his blog , which warned of the imminent ‘Advanced Advance Persistent Threats’.

Risk 40
article thumbnail

Vulnerability Scanning Best Practices: Where and When to Run Vulnerability Scans

NopSec

As penetration testers know, spending nights awake to probe networks, servers and applications is common practice. For companies completing vulnerability scanning for the first time, or even for seasoned IT security veterans, deciding where and when to run a vulnerability scan is not a straight-forward decision. Most of the time the penetration testing or vulnerability assessment is performed on production applications that need to be hit off-business hours for performance reasons.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Total Cost of Ownership for Vulnerability Management

NopSec

With any technology investment, budget is a core part of the decision criteria. IT security departments are expected to do more with less and still maintain a secure IT environment. However with IT security solutions, more so than with other IT purchases, cost considerations can have significant impact on a business’ overall risk of a serious security breach.

article thumbnail

The Single Most Important Thing You Can do to Improve Cyber-Security in 2014

NopSec

According to a reports released by the Information Security Forum and ISACA , cyber-security will continue to be a critical issue for businesses in 2014. Key threats include bring your own device (BYOD) trends, data proliferation, as well as privacy and regulation. Security implications of BYOD Unsecured personal devices can introduce a lot of potential security challenges.

article thumbnail

Data privacy: a look ahead at 2014

Privacy and Cybersecurity Law

So as the latest Snowdon revelations (oh … and the New Year Holiday fun has subsided) how about we look […].

article thumbnail

How Canada’s Anti-Spam Enforcers will Cooperate, Coordinate, Share Information

Privacy and Cybersecurity Law

Canada’s Anti-Spam Legislation (CASL) brings with it new legal violations and penalties, some of which become effective as of July 1, 2014. […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.