Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
The 3 S’s of Software Supply Chain Security: SBOMs, Signing, Slimming - The New Stack
The 3 S’s of Software Supply Chain Security: SBOMs, Signing, Slimming - The New Stack
At Slim.AI, the cloud-native startup I founded with my longtime colleague and creator of the DockerSlim open-source project Kyle Quest, we believe we must address the problem of WHAT gets shipped to production, not just how fast or how frequently teams can deploy.
·thenewstack.io·
The 3 S’s of Software Supply Chain Security: SBOMs, Signing, Slimming - The New Stack
Report: Recent 10x Increase in Cyberattacks on Ukraine
Report: Recent 10x Increase in Cyberattacks on Ukraine
As their cities suffered more intense bombardment by Russian military forces this week, Ukrainian Internet users came under renewed cyberattacks, with one Internet company providing service there saying they blocked ten times the normal number of phishing and malware attacks…
·krebsonsecurity.com·
Report: Recent 10x Increase in Cyberattacks on Ukraine
Privacy, Authenticity, and Confidentiality
Privacy, Authenticity, and Confidentiality
Authenticity and privacy are usually traded off against each other. The tradeoff is a tricky one that can lead to the over collection of data.
·windley.com·
Privacy, Authenticity, and Confidentiality
Conti Ransomware Group Diaries, Part IV: Cryptocrime
Conti Ransomware Group Diaries, Part IV: Cryptocrime
Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies,…
·krebsonsecurity.com·
Conti Ransomware Group Diaries, Part IV: Cryptocrime
Conti Ransomware Group Diaries, Part III: Weaponry
Conti Ransomware Group Diaries, Part III: Weaponry
Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it's like to be an employee of Conti's sprawling organization. Today's…
·krebsonsecurity.com·
Conti Ransomware Group Diaries, Part III: Weaponry
Conti Ransomware Group Diaries, Part II: The Office
Conti Ransomware Group Diaries, Part II: The Office
Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today. Tuesday’s story examined how Conti dealt with its own internal…
·krebsonsecurity.com·
Conti Ransomware Group Diaries, Part II: The Office
How to Build an Effective API Security Strategy
How to Build an Effective API Security Strategy
At the API Security Summit, security leaders will discuss how to increase API security fluency across an organization.
·devops.com·
How to Build an Effective API Security Strategy
Python Cybersecurity — Zip File Password Cracker
Python Cybersecurity — Zip File Password Cracker
Learn how to develop a simple Zip File password cracker, which uses a password list to brute force the encrypted file also known as a…
·vinsloev.medium.com·
Python Cybersecurity — Zip File Password Cracker
Why Developer-First is the Future of AppSec
Why Developer-First is the Future of AppSec
Developer-first AppSec is the future; here's how organizations can evaluate tools that will help them adopt a developer-first approach.
·devops.com·
Why Developer-First is the Future of AppSec
3 ways I configure SSH for privacy
3 ways I configure SSH for privacy
SSH (Secure Shell) is a protocol that enables you to create a verified and private connection, securing the channel using cryptographic keys, to launch a remote shell on another machine. Using this connection, you can execute remote commands, initiate secure file transfers, forward sockets and displays and services, and much more.
·opensource.com·
3 ways I configure SSH for privacy
Gretel.ai - Privacy Engineering as a Service
Gretel.ai - Privacy Engineering as a Service
Powerful privacy engineering tools delivered to you as APIs. Synthesize and transform data in minutes. Get started free with your Google or GitHub account.
·gretel.ai·
Gretel.ai - Privacy Engineering as a Service
Who is the Network Access Broker ‘Wazawaka?’
Who is the Network Access Broker ‘Wazawaka?’
In a great many ransomware attacks, the criminals who pillage the victim's network are not the same crooks who gained the initial access to the victim organization. More commonly, the infected PC or stolen VPN credentials the gang used to…
·krebsonsecurity.com·
Who is the Network Access Broker ‘Wazawaka?’
How to De-Risk Your Work with Personal Data - The New Stack
How to De-Risk Your Work with Personal Data - The New Stack
In this article, we will run you through the risks that affect assets that process, store, and transmit personal data. we will also touch upon how you can reduce and nullify these risks with security controls.
·thenewstack.io·
How to De-Risk Your Work with Personal Data - The New Stack
RedLine malware shows why passwords shouldn't be saved in browsers
RedLine malware shows why passwords shouldn't be saved in browsers
The RedLine information-stealing malware targets popular web browsers such as Chrome, Edge, and Opera, demonstrating why storing your passwords in browsers is a bad idea.
·bleepingcomputer.com·
RedLine malware shows why passwords shouldn't be saved in browsers
Security Navigator - Global
Security Navigator - Global
Get the big picture of cyber security: first-hand statistical data from 18 global SOCs/CyberSOCs, CSIRT & pentesting-stories, tech-deepdives and more on the hot topics of digital defense.
·orangecyberdefense.com·
Security Navigator - Global
Leveraging the Identity Metasystem
Leveraging the Identity Metasystem
Metasystems promote network effects because they provide leverage: one infrastructure that not only serves many purposes, but also engenders consistent behavior.
·windley.com·
Leveraging the Identity Metasystem
The Sigstore Trust Model
The Sigstore Trust Model
I hope this post can help reduce confusion around exactly how Sigstore’s trust model works, and how trust flows from the community root…
·dlorenc.medium.com·
The Sigstore Trust Model
Fighting TLS fingerprinting with Node.js
Fighting TLS fingerprinting with Node.js
The modern internet is full of services that want to know who you are. Fingerprinting is the latest way to do this: capturing many small…
·httptoolkit.tech·
Fighting TLS fingerprinting with Node.js
Why Trust and Integrity are Critical to IoT
Why Trust and Integrity are Critical to IoT
Trust and integrity are critical to the internet of things. If a business or consumers can’t trust the data, the IoT fails.
·devops.com·
Why Trust and Integrity are Critical to IoT
Permissions, Privileges, and Scopes
Permissions, Privileges, and Scopes
What is the difference between permissions, privileges, and scopes in the authorization context? Let's find out together.
·auth0.com·
Permissions, Privileges, and Scopes