Cybersecurity

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It? — Krebs on Security

https://krebsonsecurity.com/2018/10/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it/ You can have it fast, cheap, or secure — pick any two. It seems to be possible as long as “secure” isn’t one of your choices. “Our IT industry is inexorably international, and anyone involved in the process can subvert the security of the end product,” Schneier wrote. We don’t often hear about intentional

Steve Gibson’s Three Router Solution to IOT Insecurity

https://www.pcper.com/reviews/General-Tech/Steve-Gibsons-Three-Router-Solution-IOT-Insecurity Here are some useful tips for securing networks that have IoT devices: Even before the formulation of the term “Internet of things”, Steve Gibson had proposed home networking topology changes designed to deal with this looming IoT security threat. Unfortunately it seems that only little or no thought is given to the security aspects

Wi-Fi Gets More Secure: Everything You Need to Know About WPA3 – IEEE Spectrum

https://spectrum.ieee.org/tech-talk/telecom/security/everything-you-need-to-know-about-wpa3 The biggest Wi-Fi security update in 14 years was recently unveiled by the Wi-Fi Alliance. The Wi-Fi Protected Access 3 (WPA3) security certificate protocol provides some much-needed updates to the WPA2 protocol introduced in 2004. The Wi-Fi Alliance also announced two additional, separate from WPA3 certification, protocols: The Enhanced Open and Easy Connect

The 1.5 Billion Dollar Market: IoT Security

https://blog.paessler.com/investments-in-iot-security-are-set-to-increase-rapidly-in-2018 The two biggest challenges in 2018 will continue to be protecting against unauthorized access, and patching/updating the software of the device. Companies must not neglect the security problems of IoT and IIoT devices. Cyberattacks on the Internet of Things (IoT) are already a reality. According to Gartner‘s market researchers, global spending on IoT security

A sysadmin’s guide to SELinux | Opensource.com

https://opensource.com/article/18/7/sysadmin-guide-selinux Security. Hardening. Compliance. Policy. The Four Horsemen of the SysAdmin Apocalypse. In addition to our daily tasks—monitoring, backup, implementation, tuning, updating, and so forth—we are also in charge of securing our systems. In the spirit of The Hitchhiker’s Guide to the Galaxy, here are the 42 answers to the big questions about managing and