Article by Beau PetersAs a freelancer in any industry, you are likely more susceptible to hackers and cybercrime than many other professions. Not only are you pulling in a constant stream of customer data, but as a worker on the go, you likely wor…
Bell Labs, the Colonial Pipeline and Multi-Factor Authentication (MFA)
A simple technology invented by Bell Labs over 20
years ago (and widely used today) could have prevented the Colonial Pipeline attack.
In 1880, the French government awarded Alexander Graham Bell
roughly the equivalent of $300K as a prize for invent…
Questions about 2FA for AD admins
We’ve recently had more questions about deploying WiKID for two-factor authentication for AD admins to thwart potential privilege escalation in ransomware attacks. We’ve done a proof-of-concept showing that WiKID can make privilege escalation quite di…
Top Cyber Security Challenges Post Lockdown
By Sam Jones | Cyber Tec Security Not too long ago things were looking bleak for the world, still under the dark cloud of the COVID pandemic, but with vaccine rollouts now taking place worldwide, there is finally a light at the end of the tunnel. It’s…
Trusting Locations Bites Us Yet Again
Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020.
Philippine Air Force makes final push for Multi-Role Fighters with Saab JAS-39C/D Gripen
The Philippine Air Force (PAF) has started to make its final chance to push for the acquisition of new Multi-Role Fighter (MRF) aircraft, as securing funding for modernization projects has reached the final few months.And based on information MaxDefens…
How Network Segmentation Simplifies PCI DSS Compliance
Read more about how proper network segmentation can simplify PCI DSS compliance by effectively reducing the number of assets in scope.
Now Available: EdgeKV Distributed Key-Value Store
We’re excited to announce the availability of EdgeKV, a distributed key-value store database that enables EdgeWorkers to leverage data stored at the edge when deploying custom code across our serverless computing platform.
Cyber Security Roundup for June 2021
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, May 2021.UK Smarties Cities Cybersecurity WarningThe UK National Cyber Security Centre (NCSC…
SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities
Part of Akamai’s incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries.