April, 2016

article thumbnail

Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

Tech Republic Security

Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.

article thumbnail

Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots

Elie

As an experiment we dropped nearly 300 USB sticks on the UIUC campus to assess if USB drop attacks work and see if concerns about USB security were justified. We found out that at least 48% of the drive were plugged. This blog post summarizes how we ran the study, highlights the key findings, looks at what motivates people to plug in USB sticks, and discusses possible mitigations to improve USB security.

48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Know Thy[self] Environment

NopSec

Securing an environment is a constant game of cat-and-mouse. Safety measures of all kinds can (and should) be put in place to protect against malicious actors, downtime, and other business impacting variables. A production stack can be an extremely complex system with dozens of applications, databases, networking security groups, user permissions, etc., so what are some of these safety measures and practices that can be used, and whose responsibility is it to make sure the stack is safe?

article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to add more VPN setup options on your Ubuntu Touch device

Tech Republic Security

If you find the default VPN options on Ubuntu Touch lacking, here's how to expand the available options with the help of a third-party click package.

VPN 94
article thumbnail

Survey: Are mobile devices a security risk at your company?

Tech Republic Security

Mobile devices offer powerful productivity, but there is also the risk of security breaches. Tech Pro Research's survey looks at the best practices for securing these devices.

Mobile 77

More Trending

article thumbnail

How to connect your Android device to a VPN with VyprVPN

Tech Republic Security

If you aren't a fan of using unsecured wireless networks while on the go, a VPN client is what you want. Jack Wallen introduces you to one of the best on the Android platform.

VPN 63
article thumbnail

How to use secure shell from a Ubuntu Phone with the Terminal app

Tech Republic Security

If secure shell is your admin jam and you use a Ubuntu Phone, check out how easy it is to ssh to your Linux servers via the Terminal app.

68
article thumbnail

In-depth analysis of the lessons we learned while protecting gmail users

Elie

This post provides an in-depth analysis of the lessons we learned while protecting Gmail users and their inboxes. We felt it was about time to share the key lessons we learned the hard way while protecting Gmail for over a decade, so everyone involved in building an online product can benefit from them. To that effect, with the help of various Gmail safety leaders and long-time engineers, I distilled these lessons into a 25-minute talk for Enigma called “Lessons learned while protecting Gmail”.

article thumbnail

Improving Business Outcomes With VRM

NopSec

Time and again, we hear from information security leaders who have invested in vulnerability risk management (VRM) technology and are now asking themselves whether the time, money, and resources put into VRM implementation are delivering on the promised value. In our opinion, they can and they must, but that requires aligning your business needs with the right technology.

InfoSec 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

THE MOTIVATION AND DESIGN BEHIND AUTOGENERATED CHALLENGES

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.