How to use Signal for encrypted SMS messages
Tech Republic Security
APRIL 21, 2016
Jack Wallen shows you how to get up and running with the encrypted SMS app Signal.
Tech Republic Security
APRIL 21, 2016
Jack Wallen shows you how to get up and running with the encrypted SMS app Signal.
Elie
APRIL 10, 2016
As an experiment we dropped nearly 300 USB sticks on the UIUC campus to assess if USB drop attacks work and see if concerns about USB security were justified. We found out that at least 48% of the drive were plugged. This blog post summarizes how we ran the study, highlights the key findings, looks at what motivates people to plug in USB sticks, and discusses possible mitigations to improve USB security.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
NopSec
APRIL 27, 2016
Securing an environment is a constant game of cat-and-mouse. Safety measures of all kinds can (and should) be put in place to protect against malicious actors, downtime, and other business impacting variables. A production stack can be an extremely complex system with dozens of applications, databases, networking security groups, user permissions, etc., so what are some of these safety measures and practices that can be used, and whose responsibility is it to make sure the stack is safe?
ForAllSecure
APRIL 11, 2016
In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Tech Republic Security
APRIL 18, 2016
Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.
Tech Republic Security
APRIL 27, 2016
If you find the default VPN options on Ubuntu Touch lacking, here's how to expand the available options with the help of a third-party click package.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
APRIL 7, 2016
If secure shell is your admin jam and you use a Ubuntu Phone, check out how easy it is to ssh to your Linux servers via the Terminal app.
Tech Republic Security
APRIL 21, 2016
If you aren't a fan of using unsecured wireless networks while on the go, a VPN client is what you want. Jack Wallen introduces you to one of the best on the Android platform.
Elie
APRIL 3, 2016
This post provides an in-depth analysis of the lessons we learned while protecting Gmail users and their inboxes. We felt it was about time to share the key lessons we learned the hard way while protecting Gmail for over a decade, so everyone involved in building an online product can benefit from them. To that effect, with the help of various Gmail safety leaders and long-time engineers, I distilled these lessons into a 25-minute talk for Enigma called “Lessons learned while protecting Gmail”.
NopSec
APRIL 18, 2016
Time and again, we hear from information security leaders who have invested in vulnerability risk management (VRM) technology and are now asking themselves whether the time, money, and resources put into VRM implementation are delivering on the promised value. In our opinion, they can and they must, but that requires aligning your business needs with the right technology.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
ForAllSecure
APRIL 11, 2016
In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.
ForAllSecure
APRIL 11, 2016
In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.
Let's personalize your content