Michael Cobb CISSP-ISSAP Search Security AI and machine learning in cybersecurity: Trends to watch 06 Jan 2020 Search Security How to prevent port scan attacks 10 Dec 2019 Search Security Comparing Diffie-Hellman vs. RSA key exchange algorithms 20 Nov 2019 Search Security Zero-trust framework creates challenges for app dev 11 Nov 2019 Search Security What it takes to be a DevSecOps engineer 12 Sep 2019 Search Security DevOps security checklist requires proper integration 16 Aug 2019 Search Security How to start building a DevSecOps model 05 Aug 2019 Search Security Boost application security in DevOps with DevSecOps 08 Jul 2019 Search Security How infrastructure as code tools improve visibility 26 Apr 2019 Search Security The security benefits of using infrastructure as code 22 Apr 2019 Search Security Protect your enterprise against shadow IT in the cloud 26 Mar 2019 Search Security 5 common web application vulnerabilities and how to avoid them 19 Mar 2019 Search IoT With an IoT digital twin, security cannot be forgotten 25 Feb 2019 Search Security Weighing the cost of mitigating Spectre variant 2 21 Feb 2019 Search Security How NIST is preparing to defend against quantum attacks 10 Jan 2019 Search Security How a flaw in Apple DEP misuses an MDM server 13 Dec 2018 Search Security How did WhatsApp vulnerabilities get around encryption? 07 Dec 2018 Search Security How can users remove Google location tracking completely? 06 Dec 2018 Search Security How does TLS 1.3 differ from TLS 1.2? 05 Dec 2018 Search Security How do L1TF vulnerabilities compare to Spectre? 04 Dec 2018 Search Security What are the security risks of third-party app stores? 04 Dec 2018 Search Security How to configure browsers to avoid web cache poisoning 15 Nov 2018 Search Security How is Plead malware used for cyberespionage attacks? 09 Nov 2018 Search Security What is behind the growing trend of BEC attacks? 08 Nov 2018 Search Security How does site isolation defend against Spectre vulnerabilities? 07 Nov 2018 Search Security How does the public Venmo API pose a threat for users? 06 Nov 2018 Search Security How can U2F authentication end phishing attacks? 05 Nov 2018 Search Security The implications of the NetSpectre vulnerability 18 Oct 2018 Search Security How does Apple's Quick Look endanger user privacy? 12 Oct 2018 Search Security How did Netflix phishing attacks use legitimate TLS certificates? 11 Oct 2018 Search Security How do hackers use legitimate admin tools to compromise networks? 10 Oct 2018 Search Security How was Google Firebase security bypassed? 09 Oct 2018 Search Security How does TLBleed abuse the Hyper-Threading feature in Intel chips? 08 Oct 2018 Search Security How does the SynAck ransomware use Process Doppelgänging? 14 Sep 2018 Search Security How does Telegram malware bypass end-to-end encryption? 13 Sep 2018 Search Security How does Android Protected Confirmation provide security for users? 12 Sep 2018 Search Security What issues can arise from hardware debug exception flaws? 11 Sep 2018 Search Security How does the Android Rowhammer exploit affect users? 10 Sep 2018 Search Security How the STARTTLS Everywhere initiative will affect surveillance 06 Sep 2018 Search Security How to find the best privileged identity management tool 24 Aug 2018 Search Security Weighing privileged identity management tools' pros and cons 24 Aug 2018 Search Security How to mitigate the Efail flaws in OpenPGP and S/MIME 16 Aug 2018 Search Security Facebook user data: How do malicious apps steal user data? 10 Aug 2018 Search Security UPnP vulnerability: How is the UPnP protocol being misused? 09 Aug 2018 Search Security How do SDKs for ad networks cause data leaks? 08 Aug 2018 Search Security What does the expansion of MANRS mean for BGP security? 07 Aug 2018 Search Security Microsoft's NTFS flaw: What are the potential consequences? 06 Aug 2018 Search Security Domain fronting: Why cloud providers are concerned about it 19 Jul 2018 Search Security Drupalgeddon 2.0: Why is this vulnerability highly critical? 13 Jul 2018 Search Security How can cryptojacking attacks in Chrome be stopped? 12 Jul 2018 Search Security What are the implications of DNS over HTTPS for privacy? 11 Jul 2018 Search Security What effect does GDPR have on the WHOIS database? 10 Jul 2018 Search Security How did an old, unpatched Firefox bug expose master passwords? 09 Jul 2018 Search Security How can domain generation algorithms be used to bypass ad blockers? 08 Jun 2018 Search Security How does a SAML vulnerability affect single sign-on systems? 07 Jun 2018 Search Security How lattice-based cryptography will improve encryption 07 Jun 2018 Search Security How did cryptomining malware exploit a Telegram vulnerability? 06 Jun 2018 Search Security What risks do untrusted certificates pose to enterprises? 05 Jun 2018 Search Security How bad is the iBoot source code leak for Apple security? 04 Jun 2018 Search Security Are Meltdown and Spectre real vulnerabilities or mere flaws? 17 May 2018 Search Security How will the new WPA3 protocol strengthen password security? 04 May 2018 Search Security IoT botnets: How are new Mirai variants impacting systems? 03 May 2018 Search Security How were Android Pixel vulnerabilities exploited? 02 May 2018 Search Security How did an Electron framework flaw put Slack at risk? 01 May 2018 Search Security What is included in the mPOS security standard from PCI SSC? 30 Apr 2018 Search Security How a Blizzard DNS rebinding flaw put millions of gamers at risk 05 Apr 2018 Search Security How can improper certificate pinning be stopped by the Spinner tool? 09 Mar 2018 Search Security How does a WPAD attack work and how can it be prevented? 08 Mar 2018 Search Security How can users deal with app trackers that collect customer data? 07 Mar 2018 Search Security How does Tizi spyware affect Android apps? 06 Mar 2018 Search Security The Keeper browser extension flaw: How can users stay secure? 05 Mar 2018 Search Security Why the Bleichenbacher attack is still around 01 Mar 2018 Search Security Fight a targeted cyberattack with network segmentation, monitoring 05 Feb 2018 Search Security Bypassing facial recognition: The means, motive and opportunity 01 Feb 2018 Search Security The ROCA vulnerability: How it works and what to do about it 04 Jan 2018 Search Security How machine learning-powered password guessing impacts security 07 Dec 2017 Search Security How does the GhostHook attack bypass Microsoft PatchGuard? 01 Dec 2017 Search Security Use caution with OAuth 2.0 protocol for enterprise logins 30 Nov 2017 Search Security How can Intel AMT be used to bypass the Windows firewall? 30 Nov 2017 Search Security How do source code reviews of security products work? 29 Nov 2017 Search Security How can attacks like the Cherry Blossom project be prevented? 28 Nov 2017 Search Security How does the Stack Clash vulnerability target Unix-based OSes? 27 Nov 2017 Search Security How to prepare for potential IPv6 DDoS attacks 09 Nov 2017 Search Security What knowledge factors qualify for true two-factor authentication? 20 Oct 2017 Search Security How app libraries share user data, even without permission 19 Oct 2017 Search Security Running a private certificate authority: What are the risks? 19 Oct 2017 Search Security How did an ImageMagick vulnerability endanger Yahoo servers? 17 Oct 2017 Search Security How does Google Play Protect aim to improve Android security? 16 Oct 2017 Search Security How the Docker REST API can be turned against enterprises 05 Oct 2017 Search Security Securing endpoints with supplementary tools protects data 02 Oct 2017 Search Security How can users detect dangerous open ports in mobile apps? 14 Sep 2017 Search Security How can memory corruption attacks threaten smartphones? 13 Sep 2017 Search Security How do code-reuse attacks bypass Windows 10 security features? 12 Sep 2017 Search Security How is Pegasus malware different on Android than on iOS? 11 Sep 2017 Search Security How NotPetya ransomware used legitimate tools to move laterally 31 Aug 2017 Search Security Libpurple flaw: How does it affect connected IM clients? 10 Aug 2017 Search Security Are biometric authentication methods and systems the answer? 09 Aug 2017 Search Security What tools can bypass Google's CAPTCHA challenges? 09 Aug 2017 Search Security How did a Moodle security vulnerability enable remote code execution? 08 Aug 2017 Search Security How did flaws in WhatsApp and Telegram enable account takeovers? 07 Aug 2017 1 2 3 4