Learn about the new vulnerability that was found in Debian?s Advanced Package Tool that allows for easy lateral movement in data center.
Defensive Security Podcast Episode 232
https://www.zdnet.com/article/popular-wordpress-plugin-hacked-by-angry-former-employee/ https://www.zdnet.com/article/notpetya-an-act-of-war-cyber-insurance-firm-taken-to-task-for-refusing-to-pay-out/
https://www.zdnet.com/article/employees-sacked…
A Deep Dive into Point of Sale Security
For many, Point of Sale systems are the weakest link in the IT security chain. Learn the microsegmentation policies that can make a difference.
Defensive Security Podcast Episode 231
https://lifehacker.com/why-smart-people-make-stupid-mistakes-1831503216
https://www.chicagotribune.com/business/ct-biz-tribune-publishing-malware-20181230-story,amp.html
https://www.securityweek.com/was-north-korea-wrongly-accused-ransomware-att…
Howto install Bitwarden in a LXC container (e.g. Proxmox)
As many of you know me, I’m quite serious about security and therefore a believer in the theory that a service which is not reachable (e.g. from the Internet) cannot be attacked as easily as one that it. Looking at password managers this makes choosing not that easy. Sure there is Keepass and the descendants, […]
The post Howto install Bitwarden in a LXC container (e.g. Proxmox) first appeared on Robert Penz Blog.
5 Reasons to Transition into the Reserves
Joining the reserves after active duty could make transition that much easier.
Preparing for Y2038 (Already?!)
It is possible that the need to upgrade and replace systems in the lead-up to 2038 will force the retirement of some remaining IPv4-only systems and networks.
From the Core to the Edge: 3 Security Imperatives and the Evolving Digital Topology
The breathtaking pace at which everyone and everything is becoming connected is having a profound effect on digital business, from delivering exceptional experiences, to ensuring the security of your customers, applications, and workforce….
Life at Akamai: Making Connections
By the numbers, Akamai’s scale, reach and ability to help brands connect users to immersive and immediate online experiences while protecting their businesses from threats, is quite impressive. While I’m proud that Akamai connects with billions of devi…
Low, Medium and High Interaction Honeypot Security
Honeypots are a popular way to protect data centers and learn about attackers. Learn the difference between high and low interaction honeypot security.