Cyber Defense Advisors

Cyber Threat Trends

  • by
  • November 13, 2022

How to Fix CloudFormation

ACM.110 CloudFormation is an amazing concept but it needs a little TLC This is a continuation of my series of posts on Automating Cybersecurity Metrics. In the last post we looked at adding a policy to our VPC Endpoint that provides access to CloudFormation via a private network (i.e. without traversing the Internet.) Add a Policy […]

Cyber News, Cyber Threat Trends
  • by
  • November 12, 2022

Add a Policy to an AWS VPC Endpoint

ACM.109 Combining IAM and network controls to improve cloud security defenses This is a continuation of my series of posts on Automating Cybersecurity Metrics. In a prior post we created an AWS VPC Endpoint to use with CloudFormation. VPC Endpoint for CloudFormation Then we valiated that the traffic traverses a private route. Validating VPC Endpoint Connections Occur […]

Cyber News, Cyber Threat Trends

Security challenges facing SMBs – Week in security with Tony Anscombe

New ESET report shows how ever-growing threats impact SMB sentiment and why many SMBs are underprepared to defend against attacks The post Security challenges facing SMBs – Week in security with Tony Anscombe appeared first on WeLiveSecurity

Cyber News, Cyber Threat Trends

Friday Squid Blogging: Squid Purse

Perfect for an evening out. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Cyber News, Cyber Threat Trends

New Book: A Hacker’s Mind

I have a new book coming out in February. It’s about hacking. A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back isn’t about hacking computer systems; it’s about hacking more general economic, political, and social systems. It generalizes the term hack as a means of subverting a system’s rules […]

Cyber News, Cyber Threat Trends

Tokenization VS Encryption – Which one suits your business needs? 

The number of data breach incidents rises every year as technology advances. The ease of technology extends to the… The post <strong>Tokenization VS Encryption – Which one suits your business needs?</strong>  appeared first on JISA Softech Pvt Ltd.

Cyber News, Cyber Threat Trends

CISA Releases SSVC Guide to Help Companies Prioritize Vulnerabilities

Remediation efforts are prioritized based on exploitation status, safety impact and prevalence criteria

Cyber News, Cyber Threat Trends
  • by
  • November 11, 2022

Dangerous SIM-swap lockscreen bypass – update Android now!

A bit like leaving the front door keys under the doormat…

Cyber News, Cyber Threat Trends

Man Arrested in Ontario For Alleged LockBit Ransomware Involvement

Mikhail Vasiliev was apprehended in Canada and is in custody awaiting extradition to the US

Cyber News, Cyber Threat Trends