Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
Black Hat USA 2013 Showcases NAND, Windows 8 Secure Boot Hacking Talks
A posting from Dark Reading in there Authentication Section: As July’s Black Hat US in Las Vegas nears, organizers have confirmed another trio of highlighted Briefings from the show, which all focus, in some way or other, on getting under the skin of key systems. Here’s the official rundown: – Technologies don’t get much more ubiquitous […]
Bad SSH Key Management Leaves Databases At Risk
A posting from Dark reading in there Database Security Section: A “gaping hole” in the way enterprises govern the use of one of IT’s least sexy but most used access control and encryption protocols is leaving many sensitive database servers and other network devices at serious risk. Secure Shell (SSH)–a Swiss army knife in the arsenal of […]
Black Hat USA 2013 Showcases NAND, Windows 8 Secure Boot Hacking Talks
A posting from Dark Reading in there Authentication Section: As July’s Black Hat US in Las Vegas nears, organizers have confirmed another trio of highlighted Briefings from the show, which all focus, in some way or other, on getting under the skin of key systems. Here’s the official rundown: – Technologies don’t get much more ubiquitous […]
Bad SSH Key Management Leaves Databases At Risk
A posting from Dark reading in there Database Security Section: A “gaping hole” in the way enterprises govern the use of one of IT’s least sexy but most used access control and encryption protocols is leaving many sensitive database servers and other network devices at serious risk. Secure Shell (SSH)–a Swiss army knife in the arsenal of […]