Earlier this week, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) issued a joint document entitled Kubernetes Hardening Guidance.…
Security
-
-
Recently I spoke with Ryan Chapman of the SANS Institute, author of the upcoming SANS course FOR528: Ransomware for Incident Responders, on how to…
-
The attack on US-based software provider Kaseya by notorious Russia-linked ransomware group REvil in July 2021 is estimated to have affected up to 2,000…
-
Unsanctioned software and applications running on corporate mobile devices is a security nightmare. These can range from meeting genuine business needs—commonly referred to as…
-
Any lingering indifference to cybersecurity risk has evaporated in the face of spiking ransomware attacks, software supply chain threats, and the challenges of securing…
-
LinuxNetwork SecurityNewsOperating SystemPC & LaptopServerSoftware
How to use the nl command: 2-Minute Linux Tips
Hi, this is Sandra Henry-Stocker, author of the “Unix as a Second Language” blog on Network World.In this Linux tip, we’re going to look…