Let the Data Flow! How Japan-EU Privacy Pact Boosts Data Sharing, Trade
Here's how an agreement between Japan and the European Union will impact the safety of data transfer.
Here's how an agreement between Japan and the European Union will impact the safety of data transfer.
For today's global businesses, data privacy is no longer just about compliance—it’s integral to maintaining competitiveness and customer satisfaction.
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore why digital trust is a key factor for organizations today.
Since Active Directory is the foundation of all Windows networks, monitoring Active Directory needs to be part of any comprehensive security strategy. Up to version 3.5, EventSentry utilized Windows auditing and the security event log to provide reports on: User Account Changes, Group Changes and Computer Account Changes.
Named in the top 10 world’s most dangerous people alongside Trump & Putin, we are all under attack from Magecart. They attack websites, digital platforms & e-commerce 3rd party supply chains to steal our data, selling it to the highest bidder on the dark web. Our aim is to increase awareness on Magecart attacks, therefore we’ve created an event for Leeds Digital Festival.
Have you wanted to throw away your expensive internet bill and use your neighbor's insecure wifi? Was the only thing holding you back the Honeybadger single-factor auth flow? Well, have I got news for you.
The threat landscape has become increasingly diverse and the systems used to attack are more sophisticated than ever before. In 2018, enterprises and organizations of all sizes and across all industries faced serious data breaches (information leaks were experienced by Aadhar —1.1B users; myFitnessPal —150M; Quora—100M; Facebook—29M and many more). One of the biggest victims was Marriot.
This week CVE-2019-3874 was discovered which details a flaw in the Linux kernel where an attacker can circumvent cgroup memory isolation using the SCTP socket buffer. In containerised environments, this has the potential for a container running as root to create a DoS.
Scenario You are running a large production environment with many Windows servers. There are multiple forests in the network and some forests have multiple domain controllers. Your Windows server security is paramount – you want to track and audit suspicious activities and view detailed Windows reports extracted from the Windows servers event logs.
Recently, a new Kubernetes related vulnerability was announced that affected the kube-apiserver. This was a denial of service vulnerability where authorized users with write permissions could overload the API server as it is handling requests. The issue is categorized as a medium severity (CVSS score of 6.5) and can be resolved by upgrading the kube-apiserver to v1.11.8, v1.12.6, or v1.13.4.