Category: CommunityCommunity tagged "security"

A few months ago, Google announced plans to move its corporate applications to the cloud; a new security model that it has referred to as The BeyondCorp Initiative. Rather than trust an internal corporate network to protect its mission-critical systems, Google is shirking tradition. It’s operating on the belief that internal networks are just as […]

Dec 31, 2015, 2:22 pmBy: Corey Northcutt (0) Comments

As you’ve no doubt heard, Dell recently made a monumental security screw-up. In an effort to make life easier for the company’s support services, it included a trusted public TLS certificate in the root certificate store of certain models of PC. It also included the private key used to generate that certificate. Because the private […]

DellSecuritySystem Administration
Dec 29, 2015, 2:26 pmBy: Corey Northcutt (0) Comments

There’s a standard narrative in the cloud world. If you pay attention to the media generated around the cloud industry, you’ll be familiar with it. It goes something like this: in the early days of the cloud, security was a problem; cloud vendors focused on convenience and technology, not so much on the compliance, privacy, […]

CloudEnterprise ITSecuritySystem Administration
Dec 15, 2015, 11:48 amBy: Corey Northcutt (0) Comments

The most worrying security incidents for the enterprise and the data center infrastructure that supports it are not the DDoS attacks we hear so much about or the occasional WordPress vulnerability that hits the headlines; the truly worrying incidents are caused by advanced persistent threats. The best way to get a grasp on advanced persistent […]

SecuritySystem Administration
Dec 10, 2015, 3:29 pmBy: Corey Northcutt (0) Comments

When a software vulnerability is found — whether by a security researcher, a sysadmin, or an end user — there are four ways the discoverer might proceed. Firstly, the discoverer might do nothing at all. Secondly, they might immediately release details of the vulnerability to the public (full disclosure). Thirdly, they might contact the developer […]

Enterprise ITSecuritySystem Administration
Dec 3, 2015, 2:43 pmBy: Corey Northcutt (0) Comments


Sign up to receive periodic InterWorx news, updates and promos!

New Comments

Current Poll

  • This field is for validation purposes and should be left unchanged.