Community



  • MS Security

    MS Security


    Four operational practices Microsoft uses to secure the Azure platform
    Published. November 15, 2018

    Customers tell me that one of their on-premises security challenges is recruiting and maintaining security experts. At Microsoft, we employ more than 3,500 cybersecurity experts to identify and respond to threats and help your organization to rapidly improve your overall security posture....


  • Security Intelligence

    Security Intelligence


    4 Tips to Make the Most of Your Security Budget
    Published. November 15, 2018

    Getting an increase security budget approved is one thing; spending it effectively is another challenge altogether. Follow these tips to get the most value out of your SOC's funds. The post 4 Tips to Make the Most of Your Security Budget appeared first on Security Intelligence....


  • Krebs on Security

    Krebs on Security


    Patch Tuesday, November 2018 Edition
    Published. November 14, 2018

    Microsoft on Tuesday released 16 software updates to fix more than 60 security holes in various flavors of Windows and other Microsoft products. Adobe's also got security patches available for Flash, Acrobat and Adobe Reader users. ...


  • Industrial Security

    Industrial Security


    Cyber Security Experts At Your Service: A Conversation with Tripwire’s Randy Esser
    Published. November 14, 2018

    To help provide a flavor of the insights and experience that Tripwire makes available, we’re conducting one-on-one interviews with several Tripwire in-house experts. You may have seen some of their bylines in Belden’s industrial blog over the past couple of years, but in this new series we want to provide a more direct glimpse into each expert’s individual industry purview. Each of them will discuss their own personal views on the current state of cyber security in the industrial environment....


  • TI E2E Community

    TI E2E Community


    Blog Post: 5 ways TI’s tiny devices deliver huge innovations to engineers
    Published. November 8, 2018

    As electronic circuits have become smaller, their components have gotten smarter, faster and capable of processing more information – often requiring less power than ever before. “Small size” has been a key semiconductor trend for years, and many tiny devices from TI are helping you overcome design challenges in a multitude of applications. Here are five big reasons to go small. 1. Less board space = integrated features Whether it’s in their cars, their home or their hands, consumers are...


  • All About Microsoft

    All About Microsoft


    New Windows 10 19H1 test build adds new security, high DPI settings
    Published. November 7, 2018

    Microsoft is continuing to tweak settings and add incremental new features to the next feature release of Windows 10, 19H1, with test build 18277....


  • SecureRF's IoT Security Blog

    SecureRF's IoT Security Blog


    Recent Support for IoT Security and Quantum Technology Legislation
    Published. November 7, 2018

    Small business owners are embracing the benefits of connected technologies and the IoT, but in many cases they are not addressing the security vulnerabilities that come with connected technologies. This type of behavior is encouraging lawmakers to propose IoT security legislation like California’s  connected devices security bill, the first of its kind. While federal legislation for IoT security… The post Recent Support for IoT Security and Quantum Technology Legislation appeared first...


  • Cyber Defense

    Cyber Defense


    "Your SIEM Questions Answered"
    Published. October 24, 2018

    by Justin Henderson, John Hubbard, Ismael Valenzuela In this post, SANS instructors Justin Henderson, John Hubbard, and Ismael Valenzuela tackle some of the common questions they get from defenders looking to use their Security Information and Event Management (SIEM) platform as a high-impact detection tool. If you are considering attending the Tactical Detection & Data … Continue reading Your SIEM Questions Answered...


  • Taking Measure

    Taking Measure


    Identify, Protect, Detect, Respond and Recover: The NIST Cybersecurity Framework
    Published. October 23, 2018

    The NIST Cybersecurity Framework consists of standards, guidelines and best practices to manage cybersecurity-related risk. The Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. We spoke with Amy Mahn, an international policy specialist in the NIST Applied Cybersecurity Division, about the Framework, who can use it and how it's evolving.   What...


  • Linux and Open Source

    Linux and Open Source


    Google Fuchsia: Here's what the NSA knows about it
    Published. October 12, 2018

    Fuchsia is Google's mystery operating system. At the recent Linux Security Summit, the NSA revealed what they've found out about it to date....


  • Cloakable

    Cloakable


    Quantum Computing, Message Security and Whitebox Cryptography
    Published. October 11, 2018

    The Cryptographic community has been watching the development of Quantum Computing for many years now. The looming specter of computation power able to break our current asymmetric algorithms such as RSA and ECC is of […]...


  • Mocana IoT Security Blog

    Mocana IoT Security Blog


    Mocana Enables the Highest Level of IoT Device Authentication Assurance with TPM 2.0 Support
    Published. July 25, 2018

    As the pace of cyber attacks on Internet of Things (IoT) and industrial systems continues to rise, there is a critical need for stronger security on IoT and industrial devices. For the past 15 years, Trusted Platform Module (TPM) technology has been used broadly by major chip vendors such as Intel, AMD, Infineon and others to prove the identity of a computer or financial transaction device....


  • From Silicon to Software

    From Silicon to Software


    Creating IoT Security from Silicon To Software
    Published. September 11, 2018

    Attackers often take advantage of the complexity that comes with balancing greater end-user convenience with traditional security. Behind that cool and responsive interface of an IoT device is millions of lines of code and superfast processing. The weakest link is something basic — a faulty implementation of a protocol, or a lack of a trusted […]...


  • Darktrace

    Darktrace


    Ransomware one year after WannaCry: attack vectors still commonly exploited by attackers
    Published. May 9, 2018

    This article discusses some of the most common infection vectors and how the Darktrace Enterprise Immune System can assist security teams in catching ransomware threats....


  • IEEE Tech Talk Blog

    IEEE Tech Talk Blog


    Computer Security Researchers: WPA3 Could Have Been Better, Stronger
    Published. September 11, 2018

    The Wi-Fi Alliance’s new certifications emphasize security, but outside researchers see missed opportunities...


  • Victor Chertakovsky

    Victor Chertakovsky


    How to Charge Lithium Iron Phosphate Rechargeable Batteries
    Published. September 2, 2018

    Lithium Iron Phosphate batteries are safer than Lithium-ion cells and are available in a range of huge cell sizes between 5 and 100 AH with much longer cycle life than conventional batteries...


  • Electronics Engineering Video Blog

    Electronics Engineering Video Blog


    EEVblog #1110 – Mailbag
    Published. August 9, 2018

    More than an hour of Mailbag! Forum HERE SPOILERS: Sony DVO-1000MD medical device video DVD recorder teardown 8:09 Security ISA card teardown from the 1980’s 18:39 Power Grid the board game! 25:02 USB soldering iron 27:21 TI-nSpire CAS+ calculator PROTOTYPE! 35:28 DIY JBC/Hakko soldering iron controller 41:49 UV LED lamp for PCB exposure 45:10 DIY ......


  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog


    Elliptic Curve Cryptography
    Published. November 16, 2015

    Secure online communications require encryption.  One standard is AES (Advanced Encryption Standard) from NIST.  But for this to work, both sides need the same key for encryption and decryption.  This is called Private Key encryption.  Public Key encryption is used to create a private key between two sides that have not previously communicated.  Compared to the history......


  • Industrial Control Systems Security

    Industrial Control Systems Security


    "Preparing for Cyber Security Incidents"
    Published. September 26, 2017

    This blog post was written by ICS515 instructor,Kai Thomsen. Talk with any incident responder and you'll learn that there are a few less glamorous parts of the job. Writing the final report and preparation in advance to an incident are probably top contenders. In this article I want to focus on preparation and explain to … Continue reading Preparing for Cyber Security Incidents...


  • Tech Design Forums Blog

    Tech Design Forums Blog


    Holistic verification change needed for self-driving cars
    Published. June 19, 2018

    Verification of the coming generation of highly autonomous vehicles needs says Peter Davies, director of security concepts at Thales....


  • Verification Horizons Blog

    Verification Horizons Blog


    Accellera Proposes a New Working Group
    Published. April 6, 2018

    Accellera to explore the need for an IP Security Assurance Standard In the era of SoC design where major design intellectual property (IP) blocks come from multiple sources and are combined to create an SoC or major block to be incorporated into yet another SoC, how can one test such systems to ensure they are […]...


  • Gabe On EDA

    Gabe On EDA


    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


  • scalability.org

    scalability.org


    Disk, SSD, NVMe preparation tools cleaned up and on GitHub
    Published. September 14, 2017

    These are a collection of (MIT licensed) tools I’ve been working on for years to automate some of the major functionality one needs when setting up/using new machines with lots of disks/SSD/NVMe. The repo is here: https://github.com/joelandman/disk_test_setup . I will be adding some sas secure erase and formatting tools into this. These tools wrap other […]...


  • Functional Verification Blog

    Functional Verification Blog


    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...


  • Electrical Engineers  Talk Tech

    Electrical Engineers Talk Tech


    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...


  • Rands In Repose

    Rands In Repose


    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...


  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection


    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....


  • Laptops and Desktops Blog

    Laptops and Desktops Blog


    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....



Share and Enjoy:
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
Extension Media websites place cookies on your device to give you the best user experience. By using our websites, you agree to placement of these cookies and to our Privacy Policy. Please click here to accept.