https://www.csoonline.com/article/3265024/privacy/are-you-letting-gdpr-s-privacy-rules-trump-security.html
http://www.zdnet.com/article/doj-indicts-iranian-hackers-for-stealing-data-from-144-us-universities/
https://www.databreachtoday.com/report-gucci…
Illuminating the Path to Digital Maturity
Research By Akamai and Forrester Sheds New Light on Digital Experience Challenges and Opportunities Nearly every business today is striving to create and deliver digital experiences that stand apart. But it’s no small task turning those visions into re…
Defensive Security Podcast Episode 213
https://www.theguardian.com/business/2018/mar/14/equifax-insider-trading-data-breach-jun-ying-charged
https://gizmodo.com/us-power-company-fined-2-7-million-over-security-flaws-1823745994
https://www.csoonline.com/article/3262551/data-protection/are-yo…
Recovering Plaintext Passwords from Azure Virtual Machines
Security design flaw in the VM Access plugin that may enable a cross platform attack impacting every machine type provided by Azure. Read More…
EGYPT LAUNCHES NEW DIGITAL FORENSICS LAB
IN BRIEF: The Government of Egypt has announced that it is setting up a
specialized digital forensic lab for Intellectual Property as part of its
enforcement schemes of combating software piracy.
—————————————
…
Experiments with Browser Preconnects
Blog Blog https://www.akamai.com/blog CySecBot CySecBot
Spain in the 60s: Seen through the eyes of British audiences
British Pathé’s fascinating collection of archive newsreels illustrates how far Spain has come in the last 60 years but also exposes how British reporting on “sun-soaked España” could be comically patronising.
How to evaluate and select the best encryption services
Encryption is necessary after all, so the only discussions about this technology and these services should be about choosing a solution.
When to comes to truly protecting data, encryption is a no-brainer. In fact, some industry…
The Myth of “Staying One Step Ahead of the Hackers”
The assumption that software security can stay ahead of the hackers is not true because the software security industry is always reacting to threats that hackers expose. Once hackers start exploiting a flaw in an application, security …
Kali Linux in the Windows App Store
No, really…this isn’t clickbait. For the past few weeks, we’ve been working with the Microsoft WSL team to get Kali Linux introduced into the Microsoft App Store as an official WSL distribution and today we’re happy to announce…