AT&T teams with Cisco to create new managed SASE offering
Whether organizations call it digital transformation or just using technology to create opportunities for new, easier ways to work, one thing is certain. Businesses increasingly...
What to Do If You’re Caught Up in a Data Breach
It happens with more regularity than any of us like to see. There’s either a headline in your news feed or an email from a...
Israeli newspapers targeted by hackers on anniversary of Iranian general’s assassination
The Jerusalem Post says that its website was defaced on Monday, and pointed the blame at pro-Iranian hackers who they said posted an illustration depicting...
New Hardened macOS 11 & 10.15 VMs in AWS Marketplace
Apple users rejoice! CIS Hardened Images for macOS Big Sur (11) and Catalina (10.15) are now available in Amazon Web Services (AWS) Marketplace. These CIS...
Technology’s contributions toward safety in healthcare
This blog was written by an independent guest blogger. Technology in healthcare has the potential to make all the difference in terms of safety outcomes....
NSA Guidance: Zero Trust Applied to 5G Cloud Infrastructure contd: Parts 3 and 4
Part 2 of a 2-part series By: Kathleen M. Moriarty, CIS Chief Technology Officer and active participant in the Critical Infrastructure Partnership Advisory Council (CIPAC)...
The Internet is for Everyone to Enjoy—We’re Helping See to It
The internet is meant for all to enjoy. And that’s who we’re looking out for—you and everyone who wants to enjoy life online. We believe it’s important that someone has your back like that, particularly...
Happy 12th Birthday, KrebsOnSecurity.com!
KrebsOnSecurity.com celebrates its 12th anniversary today! Maybe “celebrate” is too indelicate a word for a year wracked by the global pandemics of COVID-19 and ransomware....
Manual and semi-automated testing for IDORs using Burp Suite
This blog was written by an independent guest blogger. This article explores how you can locate Insecure direct object references (IDORs) using Burp Suite. Primarily,...
What’s the Difference Between Identity Fraud and Identity Theft?
What’s the difference between identity fraud and identity theft? Well, it’s subtle, so much so that it’s easy to use them nearly interchangeably. While both can take...