Mitigating the Security Risks of Cloud-Native Applications

Posted on February 6th, 2019 by Responsible Cyber

While containers can create more secure application development environments, they also introduce new security challenges that affect security and compliance. Containers represent the most significant computing advancements for enterprise IT since VMware introduced its first virtualization product, Workstation 1.0, in 1999. They enable organizations to build, ship, and run applications faster than ever, fueling the […]

Read More

Military Carrier Pigeons in the Era of Electronic Warfare

Posted on February 1st, 2019 by Responsible Cyber

They have advantages: Pigeons are certainly no substitute for drones, but they provide a low-visibility option to relay information. Considering the storage capacity of microSD memory cards, a pigeon’s organic characteristics provide front line forces a relatively clandestine mean to transport gigabytes of video, voice, or still imagery and documentation over considerable distance with zero […]

Read More

15 secure coding practices to use in digital identity

Posted on January 30th, 2019 by Responsible Cyber

When software analysis firm CAST analyzed 1380 software applications they found a whopping 1.3 million software vulnerabilities in the code. Anyone reading CSO will know that software flaws give cybercriminals an open door. Identity management is arguably the most at risk service of all technology disciplines. Identity theft stalks us all. Javelin Research has reported […]

Read More

Thieves’ names and descriptions made public on B&Q database

Posted on January 30th, 2019 by Responsible Cyber

by Danny Bradbury When people find unsecured Elasticsearch databases online, they often contain sensitive customer information. Not so with UK-based DIY giant B&Q, which reportedly suffered its own breach this week. Instead of customer data, an exposed Elasticsearch instance gave up information on around 70,000 shoplifters, according to Australian security researcher Lee Johnstone. The exposed […]

Read More