Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
SBOMs Are Great for Supply Chain Security but Buyers Beware
SBOMs Are Great for Supply Chain Security but Buyers Beware
While software bill of materials (SBOMs) have emerged as a potential way for organizations to begin to secure their supply chains, they are not a panacea. However, complementing SBOMs with Supply-Chain Levels for Software Artifacts (SLSA) shows great promise. SLSA provides a framework and roadmap so that the industry can start adhering to the implementation of SBOMs and other security good practices for securing the software supply chain.
·thenewstack.io·
SBOMs Are Great for Supply Chain Security but Buyers Beware
The Security Pros and Cons of Using Email Aliases
The Security Pros and Cons of Using Email Aliases
One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a "+" character after the username portion of your email address -- followed by…
·krebsonsecurity.com·
The Security Pros and Cons of Using Email Aliases
What do we trust to keep our data private?
What do we trust to keep our data private?
We find it fascinating to contemplate the future of privacy and confidentiality in computation. Privacy-enhancing technologies (PETs), as a…
·medium.com·
What do we trust to keep our data private?
ORCID
ORCID
·orcid.org·
ORCID
Subversive Trilemma: Why Cyber Operations Fall Short of Expectations
Subversive Trilemma: Why Cyber Operations Fall Short of Expectations
Abstract. Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. But a growing body of research shows how cyber operations tend to fall short of their promise. The reason for this shortfall is their subversive mechanism of action. In theory, subversion provides a way to exert influence at lower risks than force because it is secret and indirect, exploiting systems to use them against adversaries. The mismatch between promise and practice is the consequence of the subversive trilemma of cyber operations, whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables. A case study of the Russo-Ukrainian conflict provides empirical support for the argument. Qualitative analysis leverages original data from field interviews, leaked documents, forensic evidence, and local media. Findings show that the subversive trilemma limited the strategic utility of all five major disruptive cyber operations in this conflict.
·direct.mit.edu·
Subversive Trilemma: Why Cyber Operations Fall Short of Expectations
How the Saitama backdoor uses DNS tunnelling
How the Saitama backdoor uses DNS tunnelling
A walkthrough of one of the stealthy communication techniques employed in a recent attack using APT34's Saitama backdoor.
·blog.malwarebytes.com·
How the Saitama backdoor uses DNS tunnelling
OAuth Security in a Cloud Native World
OAuth Security in a Cloud Native World
Outlining how my thinking has evolved after working with various cloud deployment types and integrating security into many kinds of apps.
·thenewstack.io·
OAuth Security in a Cloud Native World
Does GraphQL Introduce New Security Risks?
Does GraphQL Introduce New Security Risks?
GraphQL is a friendly alternative to REST APIs. But there are some security repercussions of adopting GraphQL developers need to know.
·devops.com·
Does GraphQL Introduce New Security Risks?
Linux Security Study Reveals When, How You Patch Matters
Linux Security Study Reveals When, How You Patch Matters
Computer security only happens when software is kept up to date. That should be a basic tenet for business users and IT departments. Apparently, it isn’t. At least for some Linux users who ignore installing patches, critical or otherwise.
·linuxinsider.com·
Linux Security Study Reveals When, How You Patch Matters
Removing the stigma of a CVE | The GitHub Blog
Removing the stigma of a CVE | The GitHub Blog
Do you worry that a CVE will hurt the reputation of your project? In reality, CVEs are a tracking number, and nothing more. Here's how we think of them at GitHub.
·github.blog·
Removing the stigma of a CVE | The GitHub Blog
The Problem With Security
The Problem With Security
Making security every team’s problem and recruiting those most interested to formalize their involvement is a solid cultural approach.
·devops.com·
The Problem With Security
First Malware Running on AWS Lambda Discovered
First Malware Running on AWS Lambda Discovered
Amazon Web Services (AWS) Lambda, serverless computing's poster child, is over seven years old and only now has experienced the first malware specifically targeting Lambda, Denonia
·thenewstack.io·
First Malware Running on AWS Lambda Discovered
How to Build a Zero-Trust Culture
How to Build a Zero-Trust Culture
When few developers see security it as their responsibility, how do you build a culture to support a zero trust strategy in your organization? #security #DevSecOps #zerotrust
·thenewstack.io·
How to Build a Zero-Trust Culture
The Ukrainian War, PKI, and Censorship
The Ukrainian War, PKI, and Censorship
PKI has created a global trust framework for the web. But the war in Ukraine has shone a light on its weaknesses. Hierarchies are not good architectures for building robust, trustworthy, and stable digital systems.
·windley.com·
The Ukrainian War, PKI, and Censorship