Industry insights January 17, 2023 Drew Robb Data storage security isn’t working: Here are 5 ways to improve Data storage and backup systems are far more insecure than other IT systems, research says. Here are five ways to improve their security.
Secure coding January 17, 2023 Nitesh Malviya DevSecOps Tools of the trade Dig into the DevSecOps tools, including Source Composition Analysis and Static Analysis Security Testing, used in cybersecurity work.
General security January 16, 2023 Bianca Gonzalez Password security: Using Active Directory password policy Learn how to implement password security policies using Active Directory in this walkthrough from Infosec Skills author Mike Meyers.
Secure coding January 16, 2023 Gilad Maayan Secure software deployment for APIs Why application programming interfaces (or APIs) are an essential component of cybersecurity.
Professional development January 13, 2023 Christine McKenzie Infosec scholarship winner Kandice Kucharczyk salutes her mentors as she sets her sights high Infosec scholarship winner Kandice Kucharczyk was mentored by CISA’s director, Jen Easterly, who helped her set her ambitions higher.
Application security January 12, 2023 Nitesh Malviya Introduction to DevSecOps and its evolution and statistics Learn about the growth of DevSecOps and key statistics associated with it for 2022.
Secure coding January 11, 2023 Gilad Maayan Software dependencies: The silent killer behind the world’s biggest attacks Why software dependencies represent a risk to virtually all software projects.
Malware analysis January 10, 2023 Pedro Tavares How AsyncRAT is escaping security defenses Learn more about the popular and dangerous AsyncRAT malware.
Industry insights January 10, 2023 Drew Robb Protect your data with zero-trust networks 83% of former employees retain access to one or more of your company's accounts. It's past time to use a zero-trust network to ensure your data stays safe.
News January 9, 2023 Dan Virgillito Twitter users’ emails leaked, ChatGPT used to write malware and Slack’s repository breach Twitter hack exposes emails of over 200 million users, threat actors exploit ChatGPT to write malicious code and the breach of Slack’s private GitHub repositories....