Month: February 2022
5 posts
Going Upstream in Search of Secure Linux
GNU/Linux and open source software in general are a backbone of IT infrastructure worldwide. In stark contrast to…
February 23, 2022 18:19 GMT
Breach Report: Healthcare
The healthcare industry continues to face significant threats, with data breaches and ransomware attacks still leading the pack.…
February 17, 2022 17:49 GMT
What You Need to Know About Shrinking Certificate Lifespans
A threat to modern encryption comes from ever increasing power in brute force hardware and the looming prospect of quantum computing. Its time to shift to a shorter certificate and key cycle.
February 17, 2022 11:43 GMT
Analysis of GalComm Chrome Extension Malware
A deep dive into malicious, browser-jacking Chrome extensions facilitated by Israeli Internet marketing service GalComm.
February 7, 2022 16:28 GMT
Quantifying Cybersecurity Risk and Uncertainty
Adapting a few quantitative analysis methodologies to decision making in cybersecurity planning can help reduce the guesswork. Mostly.
February 3, 2022 19:13 GMT