Security

Security | News, how-tos, features, reviews, and videos

1 network internet connected grid earth power satellite view

template c100.00 04 14 02.still001
video

Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.

08 terror

Cloud misconfiguration: The security threat too often overlooked

I’m seeing a lot of cloud configuration errors in the real world—and it’s scaring the hell out of me

13 ssl

How to enforce SSL in ASP.Net Core

Take advantage of HTTPS and the HSTS security enhancement to encrypt web client and server communications in your ASP.Net Core applications

screen shot 2018 09 21 at 10.43.22 am

Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted.

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

elephant big data analytics hadoop

How to secure your PostgreSQL database

Follow these steps to enable SSL connections and properly configure user privileges to keep your database secure

globe and abstract data points

How enterprise knowledge graphs can proactively reduce risk

Incorporating knowledge graphs with artificial intelligence offer newfound ability to seek out data security threats instead of simply reacting once noncompliance or data losses occurs

09 backups

Replication isn’t data protection. Here’s why

Despite replication increasing in usage over traditional backup workflows, it’s not enough to protect your data alone

linus torvalds

Linus Torvalds: Changes in hardware change Linux development

Bugs are getting more esoteric, and hardware isn’t getting faster at the same pace it used to

template c100.00 01 59 12.still001
video

VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45

In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.

cloud security ts

How to retrofit the cloud for security: 2 essential steps

You should build security into every enterprise-to-cloud migration. But if you didn’t do that, here’s how to reduce the risk after the fact

template c100.00 06 50 01.still001
video

Detecting bot attacks | Salted Hash Ep 44

In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.

Two-sided hybrid face and hands

How hybrid IT impacts identity management

Hybrid IT is disrupting and complicating many processes in organizations. What impact does hybrid IT have on identity management?

template c100.00 00 44 13.still001
video

Blue Team Village, DEF CON 2018 | Salted Hash Ep 43

Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.

template c100.00 03 57 09.still001
video

An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

template c100.00 06 55 04.still001
video

What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

Load More