The Advanced Package Tool (APT) is how programs, libraries, documentation, and even the kernel itself are installed and managed on Kali and other Debian-based derivatives. APT often works so well that many users don’t pay any particular attention…
Hyperbole in Breach Reporting
While reading the news this morning about yet another successful data breach, I couldn’t help but wonder if the hyperbole used in reporting about data breaches is stifling our ability to educate key stakeholders on what they really need to know.
Today…
The Hay CFP Management Method
People often ask me how I manage the vast number of abstracts and security call for papers (CFPs) submissions. So I thought I’d create a blog post to explain my process. For lack … Continue reading The Hay CFP Management Method →
The post The Hay CFP Management Method appeared first on LEO Cyber Security.
iSmartSafe Home Security System is the Safest Home Security System
iSmartSafe DIY home security system has WiFi and Cellular double protection, which make it become the best and safest home security system.
The post iSmartSafe Home Security System is the Safest Home Security System appeared first on iSmartSafe.
Tips / Solutions for settings up OpenVPN on Debian 9 within Proxmox / LCX containers
When I tried to migrate my OpenVPN setup to a container on my new Proxmox server I run into multiple problems, where searching through the Internet provided solutions that did not work or were out of date. So I thought I put everything one needs to setup OpenVPN on Debian 9 within a Proxmox / […]
The post Tips / Solutions for settings up OpenVPN on Debian 9 within Proxmox / LCX containers first appeared on Robert Penz Blog.
Introduction to DNS Data Exfiltration
Written by Asaf Nadler and Avi Aminov Updated 2/14/19 After the initial publication of this blog post, Asaf Nadler and Avi Aminov wrote a paper on the detection of malicious and low throughput data exfiltration over the DNS protocol. The…
Encryption would NOT have saved Equifax
I read a few articles this week suggesting that the big question for Equifax is whether or not their data was encrypted. The State of Massachusetts, speaking about the lawsuit it filed, said that Equifax “didn’t put in safeguards like encryption that w…
Kali Linux 2017.2 Release
We are happy to announce the release of Kali Linux 2017.2, available now for your downloading pleasure. This release is a roll-up of all updates and fixes since our 2017.1 release in April. In tangible terms, if you were to install Kali from your 2017….
The Encryption That Businesses Need, But CISOs Forget About
By Joseph Steinberg CEO, SecureMySocial @JosephSteinberg
Many businesspeople put their firms’ data at risk because they fail to understand several important concepts about encryption. Simply understanding that data…
Why Your Data Security Strategy Should Include Data Masking
Data Masking/Tokenization/Anonymization replaces sensitive information with fictitious data while retaining the original data format. The data masking process lets you continue to work with your data as if it were not encrypted. Databa…