Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
Provisional Authenticity and Functional Privacy
Provisional Authenticity and Functional Privacy
Provisional authenticity and confidentiality can help us manage the trade offs between privacy and authenticity to support online accountability along with functional privacy.
·windley.com·
Provisional Authenticity and Functional Privacy
Software Supply Chain Security: Tearing Down the Silos
Software Supply Chain Security: Tearing Down the Silos
Both application and infrastructure security are required to keep a cloud native system safe. A single solution can integrate both to foil hackers. #DevSecOps #security
·thenewstack.io·
Software Supply Chain Security: Tearing Down the Silos
The 3 S’s of Software Supply Chain Security: SBOMs, Signing, Slimming - The New Stack
The 3 S’s of Software Supply Chain Security: SBOMs, Signing, Slimming - The New Stack
At Slim.AI, the cloud-native startup I founded with my longtime colleague and creator of the DockerSlim open-source project Kyle Quest, we believe we must address the problem of WHAT gets shipped to production, not just how fast or how frequently teams can deploy.
·thenewstack.io·
The 3 S’s of Software Supply Chain Security: SBOMs, Signing, Slimming - The New Stack
Report: Recent 10x Increase in Cyberattacks on Ukraine
Report: Recent 10x Increase in Cyberattacks on Ukraine
As their cities suffered more intense bombardment by Russian military forces this week, Ukrainian Internet users came under renewed cyberattacks, with one Internet company providing service there saying they blocked ten times the normal number of phishing and malware attacks…
·krebsonsecurity.com·
Report: Recent 10x Increase in Cyberattacks on Ukraine
Privacy, Authenticity, and Confidentiality
Privacy, Authenticity, and Confidentiality
Authenticity and privacy are usually traded off against each other. The tradeoff is a tricky one that can lead to the over collection of data.
·windley.com·
Privacy, Authenticity, and Confidentiality
Conti Ransomware Group Diaries, Part IV: Cryptocrime
Conti Ransomware Group Diaries, Part IV: Cryptocrime
Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies,…
·krebsonsecurity.com·
Conti Ransomware Group Diaries, Part IV: Cryptocrime
Conti Ransomware Group Diaries, Part III: Weaponry
Conti Ransomware Group Diaries, Part III: Weaponry
Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it's like to be an employee of Conti's sprawling organization. Today's…
·krebsonsecurity.com·
Conti Ransomware Group Diaries, Part III: Weaponry
Conti Ransomware Group Diaries, Part II: The Office
Conti Ransomware Group Diaries, Part II: The Office
Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today. Tuesday’s story examined how Conti dealt with its own internal…
·krebsonsecurity.com·
Conti Ransomware Group Diaries, Part II: The Office
How to Build an Effective API Security Strategy
How to Build an Effective API Security Strategy
At the API Security Summit, security leaders will discuss how to increase API security fluency across an organization.
·devops.com·
How to Build an Effective API Security Strategy
Python Cybersecurity — Zip File Password Cracker
Python Cybersecurity — Zip File Password Cracker
Learn how to develop a simple Zip File password cracker, which uses a password list to brute force the encrypted file also known as a…
·vinsloev.medium.com·
Python Cybersecurity — Zip File Password Cracker
Why Developer-First is the Future of AppSec
Why Developer-First is the Future of AppSec
Developer-first AppSec is the future; here's how organizations can evaluate tools that will help them adopt a developer-first approach.
·devops.com·
Why Developer-First is the Future of AppSec
3 ways I configure SSH for privacy
3 ways I configure SSH for privacy
SSH (Secure Shell) is a protocol that enables you to create a verified and private connection, securing the channel using cryptographic keys, to launch a remote shell on another machine. Using this connection, you can execute remote commands, initiate secure file transfers, forward sockets and displays and services, and much more.
·opensource.com·
3 ways I configure SSH for privacy
Gretel.ai - Privacy Engineering as a Service
Gretel.ai - Privacy Engineering as a Service
Powerful privacy engineering tools delivered to you as APIs. Synthesize and transform data in minutes. Get started free with your Google or GitHub account.
·gretel.ai·
Gretel.ai - Privacy Engineering as a Service
Who is the Network Access Broker ‘Wazawaka?’
Who is the Network Access Broker ‘Wazawaka?’
In a great many ransomware attacks, the criminals who pillage the victim's network are not the same crooks who gained the initial access to the victim organization. More commonly, the infected PC or stolen VPN credentials the gang used to…
·krebsonsecurity.com·
Who is the Network Access Broker ‘Wazawaka?’
How to De-Risk Your Work with Personal Data - The New Stack
How to De-Risk Your Work with Personal Data - The New Stack
In this article, we will run you through the risks that affect assets that process, store, and transmit personal data. we will also touch upon how you can reduce and nullify these risks with security controls.
·thenewstack.io·
How to De-Risk Your Work with Personal Data - The New Stack
RedLine malware shows why passwords shouldn't be saved in browsers
RedLine malware shows why passwords shouldn't be saved in browsers
The RedLine information-stealing malware targets popular web browsers such as Chrome, Edge, and Opera, demonstrating why storing your passwords in browsers is a bad idea.
·bleepingcomputer.com·
RedLine malware shows why passwords shouldn't be saved in browsers
Security Navigator - Global
Security Navigator - Global
Get the big picture of cyber security: first-hand statistical data from 18 global SOCs/CyberSOCs, CSIRT & pentesting-stories, tech-deepdives and more on the hot topics of digital defense.
·orangecyberdefense.com·
Security Navigator - Global
Leveraging the Identity Metasystem
Leveraging the Identity Metasystem
Metasystems promote network effects because they provide leverage: one infrastructure that not only serves many purposes, but also engenders consistent behavior.
·windley.com·
Leveraging the Identity Metasystem