days
1
3
hours
1
1
minutes
5
3
seconds
1
2
search

#security

Interview with Vladimír Smitka, security specialist and researcher

“The GDPR fever opened a greatly beneficial discussion on privacy protection – before that, nobody cared!”

Earlier this month, we reviewed the research of Vladimír Smitka on open .git folders in websites globally. The results of his research were remarkable – 390,000 web pages were found with open .git directory! So we invited Vladimir for a talk on his research, GDPR implications and his views on open source vulnerabilities.

Interview with Tim Mackey [VIDEO]

AppSec at the speed of DevOps in the age of open source

In the world of DevOps, traditional application security is no longer enough. How can we improve AppSec? What are the newest security challenges that arise as DevOps becomes more mature? JAXenter editor Gabriela Motroc caught up with Tim Mackey, technical evangelist for Black Duck by Synopsys at DevOpsCon 2018 to talk about all this and more.

Two major functions of Blockchain technology aid cybersecurity

How is blockchain technology revamping cybersecurity?

Technically speaking, Blockchain has revolutionized the cybersecurity process and has considerably made it harder for cyber terrorists to tamper with critical data. In this article, Maria Thomas explores two major functions of Blockchain technology that aid cybersecurity.

Keeping the IoT under lock and key

Are PKIs the key to securing the IoT?

There’s no slowing down the growing Internet of Things. However, security concerns are becoming an unavoidable problem for consumers. Mike Nelson, VP of IoT Security, DigiCert shares his wisdom about IoT security and fighting back with Public Key Infrastructure.

Protecting your connected devices

What you need to know about IoT and cyber security

What would happen if someone hacks your alarm clock? As the Internet of Things grows, security concerns grow with it. How can you keep all of your internet connected devices safe and secure? Roman Patel shares some safety concerns about the growing infrastructure in our tech-oriented lives.

Always current, crowdsourced intelligence

Security experts can earn cryptocurrency for detecting malware

PolySwarm aims to incentivize a global community of security experts to disrupt the $8.5 billion cyber threat intelligence industry. In this article, Paul Makowski, CTO and co-founder of Swarm Technologies, explains how this works and how you can earn cryptocurrency for detecting malware.

Interview series with JAX DevOps speakers — Part 2

Should we incorporate a “Security First” mindset in DevOps? 6 experts weigh in

Should you pay more attention to security when drafting your DevOps approach? Our experts think that security should be included in the initial development along with all other concerns about how the software should perform. We invited six JAX DevOps speakers to weigh in on the importance of security in a DevOps context, companies’ move to the cloud and how/if this trend will continue to grow in 2018. 

macOS and Linux are safe

Critical Electron vulnerability puts popular Windows apps at risk

It’s been less than a month since the Spectre and Meltdown debacle but apparently, it’s time for a new flaw to dominate the news. The critical vulnerability lies in Electron — the team deployed a patch for the vulnerability and they ask you to update your apps to the latest stable version immediately.

An analysis of some corner-case performance issues with Meltdown patches

Meltdown, Spectre and Linux on AWS: Security vs. performance

The Meltdown and Spectre story continues. Even though Amazon Web Services’ (AWS) response shows that they’ve already patched and protected their infrastructure you still have work to do. AWS’ Shared Responsibility Model means that you are responsible for patching the operating system running on your EC2 instances, and this is where things get … complicated.