Seven Must-Dos to Secure MySQL 8.0
Most database breaches are blamed on insiders such as employees who are either malicious or whose security has been compromised. In fact, most of these breaches are actually caused by poor security configuration and privilege abuse. Every new database version brings security upgrades. Use them appropriately and your organization can secure its data and keep you out of trouble.
MySQL...
Putting the Reins in Good Hands
After over 300 blog posts as CEO of Centrify, this will be my last Centrify blog post.
The reason is because after having co-founded Centrify nearly 15 years ago and building it with a great team of fellow employees into a leading $100+ million in revenue cybersecurity company, I have handed over the reins.
In fact, I have handed them to...
Razy in search of cryptocurrency
Last year, we discovered malware that installs a malicious browser extension on its victim’s computer or infects an already installed extension. To do so, it disables the integrity check for installed extensions and automatic updates for the targeted browser. Kaspersky Lab products detect the malicious program as Trojan.Win32.Razy.gen – an executable file that spreads via advertising blocks on websites...
GreyEnergy’s overlap with Zebrocy
In October 2018, ESET published a report describing a set of activity they called GreyEnergy, which is believed to be a successor to BlackEnergy group. BlackEnergy (a.k.a. Sandworm) is best known, among other things, for having been involved in attacks against Ukrainian energy facilities in 2015, which led to power outages. Like its predecessor, GreyEnergy malware has been detected...
Tripwire DevOps Survival Guide for Security Professionals
Tripwire DevOps Survival Guide for Security Professionals #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{ width:100%; } .ExternalClass{ width:100%; } body{ -webkit-text-size-adjust:none; } body{ margin:0; padding:0; } img{ border:0; height:auto; line-height:100%; outline:none; text-decoration:none; } table td{ border-collapse:collapse; } #backgroundTable{ height:100% !important; margin:0; padding:0; width:100% !important; }...
Imperva Increases Self-Service Capability Fourfold with Custom Security Rules
Back in 2014, we introduced Rules (previously IncapRules) to give our customers advanced control over their application security.
Today we’re putting even more of this custom tuning power in the hands of our customers by quadrupling the number of filters available via self-service.
Rules Basics
Rules are an extensive policy engine developed in response to the emergence of increasingly advanced...