February 25, 2020
The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. Read more â¶
Review: Achieving enlightened segmentation with Illumio
Kali Linux explained: A pentesterâs toolkit
5G security is a mess. Could digital certificates help?
Lack of firmware validation for computer peripherals enables highly persistent attacks
APIs are becoming a major target for credential stuffing attacks
5 things you should know about cybersecurity insurance
Gartner names Databricks a Magic Quadrant Leader in Data Science and Machine Learning Platform. Read more â¶
While segmentation is a powerful defensive tool, itâs also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches. Read more â¶
DEALPOST
This 12-course bundle introduces students to the language and shows them how to use it in real world applications. Read more â¶
Kali Linux is the most popular penetration testing Linux distro, and jam packed with almost every offensive security tool you can think of. Read more â¶
5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages. Read more â¶
Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems. Read more â¶
New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable. Read more â¶
Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy. Read more â¶
This white paper shows how Talend and AWS are bridging the gap between data scientists and data engineers to operationalize ML. Read more â¶