The CIA Secret to Cybersecurity That No One Seems to Get
IF YOU WANT to keep yourself up at night, spend some time reading about the latest developments in cybersecurity. Airplanes hacked, cars hacked, vulnerabilities in a breathtaking range of sensitive...
View ArticleHo Ho Ho – Thanks Santa – A SteamOS Console. Oh-Oh, Oh Noooo!
Last week the Playstation 4 console was comprehensively pwned yet again (an OpenBSD flaw this time as it turns out), so in the 2015 festive holiday season we thought it would be fun to have a look at...
View ArticleDNC Database Breach – Another Preventable Mess
This was not a breach in any classic sense. What happened here is that a patch was applied to a database, and that patch appears to have removed certain safeguards that would prevent one party from...
View ArticleThe Best Things in Life are Free!
Happy Holidays from all of us at Fox Technologies! Original Source: www.seppo.net/e/ You may also be interested in: Best Practices for Unix/Linux Privileged Identity and Access Management FoxT Access...
View ArticleData security is ‘deplorable,’ say hackers at CCC meeting
Germany’s Chaos Computer Club is holding its annual congress – and 12,000 online activists have gathered for Europe’s largest hacking conference. They accuse Google, Apple and Youtube of limiting...
View ArticleThe most innovative and damaging hacks of 2015
The year’s most significant attacks highlight how hackers are changing tactics — and how security must evolve in the year ahead. Not a week went by in 2015 without a major data breach, significant...
View ArticleHow Administrative Safeguards Can Prevent Data Breaches
Preventing healthcare data breaches is a common goal for covered entities of all sizes. It can be easy to let the importance of administrative safeguards fall behind other areas, such as concerns over...
View ArticleMysterious Data Breach Exposes 191 Million Voter Records
When it comes to voting, there are basically two arguments: a civic one, which states that voting is the moral duty of every able citizen in a democracy, and an economic one, which states that voting...
View ArticleSecurity’s Biggest Winners and Losers of 2015
THIS YEAR, LAWMAKERS surprised us by taking initial steps—albeit, baby ones—to rein in some of the NSA’s mass spying and provide better oversight of the intelligence agency’s activities. It’s unclear,...
View ArticleThe Biggest Security Threats We’ll Face in 2016
2015 has been the year where social engineering became the common trend among many high-profile breaches – resulting in hundreds of millions of compromised records. Going into 2016, Wired Magazine is...
View ArticleInfographic: The Growing Linux Wave
The Growing Linux Wave: POINTS TO DEMAND FOR IDENTITY AND ACCESS MANAGEMENT SOLITIONS According to a Linux Foundation’s end-user trends report, Linux leads the way in enterprise deployments. Fox...
View ArticleSWIFT and PCI-DSS: New Approaches Needed for Assurance in a World of Non-stop...
At the official start of summertime 2016 in Britain we are starting to consume the labor of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine...
View ArticleMarginal Gains – A philosophy to live by?
I don’t know about you at the tail end of the Summer of 2016, but I am really missing the daily breakfast review of the performances at the Olympics this week; and sitting down early evening engrossed...
View ArticleDownload Report Now: 2017 Cyberthreat Defense Report
Download CyberEdge’s fourth-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,100 IT security professionals representing 15 countries and 19 industries. Key insights...
View ArticleInfographic: CIO/CISO Sprint to Survive
Given today’s evolving threat landscape, it’s understandable that organizations want to take a proactive approach against threats, create an environment of continuous compliance, and have responsive IT...
View ArticleRansomware on Linux – Think you’re off the hook?
You have to feel for all Windows support teams worldwide right now after being hit with the largest ransomware attack in internet history. Wannacry has meant a busy weekend of tedious manual effort for...
View ArticleCan Too Much Active Directory Be A Bad Thing?
Identity Access Management (IAM) I just read a recent article about IAM (Identity Access Management) projects, and the level of complication that can ensue when trying to plan and implement a project...
View ArticleSSH Management With BoKS ServerControl Software
Sponsored reports from analysts have focused on poor key and SSH management practices, a highly speculative assertion that Edward Snowden somehow used keys to gain access to systems (which he denies),...
View ArticleRansomware on Linux – Think you’re off the hook?
You have to feel for all Windows support teams worldwide right now after being hit with the largest ransomware attack in internet history. Wannacry has meant a busy weekend of tedious manual effort...
View ArticleCan Too Much Active Directory Be A Bad Thing?
Identity Access Management (IAM) I just read a recent article about IAM (Identity Access Management) projects, and the level of complication that can ensue when trying to plan and implement a project...
View Article