Month: February 2022
			5 posts		
		
Going Upstream in Search of Secure Linux
						GNU/Linux and open source software in general are a backbone of IT infrastructure worldwide. In stark contrast to…					
				
							February 23, 2022 18:19 GMT
Breach Report: Healthcare
						The healthcare industry continues to face significant threats, with data breaches and ransomware attacks still leading the pack.…					
				
							February 17, 2022 17:49 GMT
What You Need to Know About Shrinking Certificate Lifespans
						A threat to modern encryption comes from ever increasing power in brute force hardware and the looming prospect of quantum computing. Its time to shift to a shorter certificate and key cycle.					
				
							February 17, 2022 11:43 GMT
Analysis of GalComm Chrome Extension Malware
						A deep dive into malicious, browser-jacking Chrome extensions facilitated by Israeli Internet marketing service GalComm. 					
				
							February 7, 2022 16:28 GMT
Quantifying Cybersecurity Risk and Uncertainty
						Adapting a few quantitative analysis methodologies to decision making in cybersecurity planning can help reduce the guesswork. Mostly.					
				
							February 3, 2022 19:13 GMT
 
												 
												 
						 
						 
						