The Amazon S3 Outage: It’s Not About a Typo
“One typo” didn’t bring down Amazon’s S3; it’s a cascade of fail that goes up the chain of management
Read More“One typo” didn’t bring down Amazon’s S3; it’s a cascade of fail that goes up the chain of management
Read MoreLooking for a great Information Security podcast? There are plenty to choose from! Here’s a roundup of currently active Information Security podcasts.
Read MoreAn often overlooked, but very important process in the development of any Internet-facing service is testing it for vulnerabilities, knowing if those vulnerabilities are actually exploitable in your particular environment and, lastly, knowing what the risks of those vulnerabilities are to your firm or product launch. These three different processes are known as a vulnerability assessment, penetration test and a risk analysis. Knowing the difference is critical when hiring an outside firm to test the security of your infrastructure or a particular component of your network.
Read MoreThe November 2014 hack against Sony Pictures Entertainment reads like something straight out of a low-budget movie: employees walk into work one morning to see red skulls appear on their computer monitors, with threats of destruction unless certain demands are met. Move the clock forward several months and while Sony is still picking up the pieces, the security community is trying to figure out if this is just another data breach or a watershed moment in the cat-and-mouse game that defines this line of work.
Read More