6.9 C
Washington, D.C.
Wednesday, December 12, 2018

How to secure your Azure network

Cloud services like Azure offer a lot of security features straight out of the box, especially if you’re using their platform services. But virtual infrastructures are much like physical infrastructures,...

Talking DerbyCon, spy chip whispers and Google's data breach | Salted Hash Ep 47

CSO Online | Oct 11, 2018 Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to...

How secure are electronic voting machines? | Salted Hash Ep 48

CSO Online | Oct 11, 2018 With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode,...

Regulating the IoT: A conversation with Bruce Schneier | Salted Hash Ep 49

CSO Online | Oct 11, 2018 Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars,...

Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

Computerworld | Oct 11, 2018 Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis...

How to enforce SSL in ASP.Net Core

Secure Sockets Layer—SSL for short—is a standard security protocol that is used to encrypt communications between a web server and a web browser. SSL is important! Without it, information that...

Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted.

<!--Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted. | Techdailyhub

How to secure your PostgreSQL database

.(Insider Story)

IDG Contributor Network: How enterprise knowledge graphs can proactively reduce risk

Traditional enterprise risk management consisted of reactive reactionary efforts to specific domains such as cyber security, fraud detection, regulatory compliance, and legal compliance. Often, the goal was simply to minimize,...

IDG Contributor Network: Replication isn’t data protection. Here’s why

As data sets explode, more organizations are turning to disk-to-disk replication as an alternative to traditional tape backup workflows. Unfortunately, the benefits of replication are often outweighed by the risks...