Michael Cobb CISSP-ISSAP Security How to prevent port scan attacks 10 Dec 2019 Security Comparing Diffie-Hellman vs. RSA key exchange algorithms 20 Nov 2019 Security Zero-trust framework creates challenges for app dev 11 Nov 2019 Security What it takes to be a DevSecOps engineer 12 Sep 2019 Security DevOps security checklist requires proper integration 16 Aug 2019 Security How to start building a DevSecOps model 05 Aug 2019 Security Boost application security in DevOps with DevSecOps 08 Jul 2019 Security How infrastructure as code tools improve visibility 26 Apr 2019 Security The security benefits of using infrastructure as code 22 Apr 2019 Security Protect your enterprise against shadow IT in the cloud 26 Mar 2019 Security 5 common web application vulnerabilities and how to avoid them 19 Mar 2019 IoT Agenda With an IoT digital twin, security cannot be forgotten 25 Feb 2019 Security Weighing the cost of mitigating Spectre variant 2 21 Feb 2019 Security How NIST is preparing to defend against quantum attacks 10 Jan 2019 Security How a flaw in Apple DEP misuses an MDM server 13 Dec 2018 Security How did WhatsApp vulnerabilities get around encryption? 07 Dec 2018 Security How can users remove Google location tracking completely? 06 Dec 2018 Security How does TLS 1.3 differ from TLS 1.2? 05 Dec 2018 Security How do L1TF vulnerabilities compare to Spectre? 04 Dec 2018 Security What are the security risks of third-party app stores? 04 Dec 2018 Security How to configure browsers to avoid web cache poisoning 15 Nov 2018 Security How is Plead malware used for cyberespionage attacks? 09 Nov 2018 Security What is behind the growing trend of BEC attacks? 08 Nov 2018 Security How does site isolation defend against Spectre vulnerabilities? 07 Nov 2018 Security How does the public Venmo API pose a threat for users? 06 Nov 2018 Security How can U2F authentication end phishing attacks? 05 Nov 2018 Security The implications of the NetSpectre vulnerability 18 Oct 2018 Security How does Apple's Quick Look endanger user privacy? 12 Oct 2018 Security How did Netflix phishing attacks use legitimate TLS certificates? 11 Oct 2018 Security How do hackers use legitimate admin tools to compromise networks? 10 Oct 2018 Security How was Google Firebase security bypassed? 09 Oct 2018 Security How does TLBleed abuse the Hyper-Threading feature in Intel chips? 08 Oct 2018 Security How does the SynAck ransomware use Process Doppelgänging? 14 Sep 2018 Security How does Telegram malware bypass end-to-end encryption? 13 Sep 2018 Security How does Android Protected Confirmation provide security for users? 12 Sep 2018 Security What issues can arise from hardware debug exception flaws? 11 Sep 2018 Security How does the Android Rowhammer exploit affect users? 10 Sep 2018 Security How the STARTTLS Everywhere initiative will affect surveillance 06 Sep 2018 Security How to find the best privileged identity management tool 24 Aug 2018 Security Weighing privileged identity management tools' pros and cons 24 Aug 2018 Security How to mitigate the Efail flaws in OpenPGP and S/MIME 16 Aug 2018 Security Facebook user data: How do malicious apps steal user data? 10 Aug 2018 Security UPnP vulnerability: How is the UPnP protocol being misused? 09 Aug 2018 Security How do SDKs for ad networks cause data leaks? 08 Aug 2018 Security What does the expansion of MANRS mean for BGP security? 07 Aug 2018 Security Microsoft's NTFS flaw: What are the potential consequences? 06 Aug 2018 Security Domain fronting: Why cloud providers are concerned about it 19 Jul 2018 Security Drupalgeddon 2.0: Why is this vulnerability highly critical? 13 Jul 2018 Security How can cryptojacking attacks in Chrome be stopped? 12 Jul 2018 Security What are the implications of DNS over HTTPS for privacy? 11 Jul 2018 Security What effect does GDPR have on the WHOIS database? 10 Jul 2018 Security How did an old, unpatched Firefox bug expose master passwords? 09 Jul 2018 Security How can domain generation algorithms be used to bypass ad blockers? 08 Jun 2018 Security How does a SAML vulnerability affect single sign-on systems? 07 Jun 2018 Security How lattice-based cryptography will improve encryption 07 Jun 2018 Security How did cryptomining malware exploit a Telegram vulnerability? 06 Jun 2018 Security What risks do untrusted certificates pose to enterprises? 05 Jun 2018 Security How bad is the iBoot source code leak for Apple security? 04 Jun 2018 Security Are Meltdown and Spectre real vulnerabilities or mere flaws? 17 May 2018 Security How will the new WPA3 protocol strengthen password security? 04 May 2018 Security IoT botnets: How are new Mirai variants impacting systems? 03 May 2018 Security How were Android Pixel vulnerabilities exploited? 02 May 2018 Security How did an Electron framework flaw put Slack at risk? 01 May 2018 Security What is included in the mPOS security standard from PCI SSC? 30 Apr 2018 Security How a Blizzard DNS rebinding flaw put millions of gamers at risk 05 Apr 2018 Security How can improper certificate pinning be stopped by the Spinner tool? 09 Mar 2018 Security How does a WPAD attack work and how can it be prevented? 08 Mar 2018 Security How can users deal with app trackers that collect customer data? 07 Mar 2018 Security How does Tizi spyware affect Android apps? 06 Mar 2018 Security The Keeper browser extension flaw: How can users stay secure? 05 Mar 2018 Security Why the Bleichenbacher attack is still around 01 Mar 2018 Security Fight a targeted cyberattack with network segmentation, monitoring 05 Feb 2018 Security Bypassing facial recognition: The means, motive and opportunity 01 Feb 2018 Security The ROCA vulnerability: How it works and what to do about it 04 Jan 2018 Security How machine learning-powered password guessing impacts security 07 Dec 2017 Security How does the GhostHook attack bypass Microsoft PatchGuard? 01 Dec 2017 Security Use caution with OAuth 2.0 protocol for enterprise logins 30 Nov 2017 Security How can Intel AMT be used to bypass the Windows firewall? 30 Nov 2017 Security How do source code reviews of security products work? 29 Nov 2017 Security How can attacks like the Cherry Blossom project be prevented? 28 Nov 2017 Security How does the Stack Clash vulnerability target Unix-based OSes? 27 Nov 2017 Security How to prepare for potential IPv6 DDoS attacks 09 Nov 2017 Security What knowledge factors qualify for true two-factor authentication? 20 Oct 2017 Security How app libraries share user data, even without permission 19 Oct 2017 Security Running a private certificate authority: What are the risks? 19 Oct 2017 Security How did an ImageMagick vulnerability endanger Yahoo servers? 17 Oct 2017 Security How does Google Play Protect aim to improve Android security? 16 Oct 2017 Security How the Docker REST API can be turned against enterprises 05 Oct 2017 Security Securing endpoints with supplementary tools protects data 02 Oct 2017 Security How can users detect dangerous open ports in mobile apps? 14 Sep 2017 Security How can memory corruption attacks threaten smartphones? 13 Sep 2017 Security How do code-reuse attacks bypass Windows 10 security features? 12 Sep 2017 Security How is Pegasus malware different on Android than on iOS? 11 Sep 2017 Security How NotPetya ransomware used legitimate tools to move laterally 31 Aug 2017 Security Libpurple flaw: How does it affect connected IM clients? 10 Aug 2017 Security Are biometric authentication methods and systems the answer? 09 Aug 2017 Security What tools can bypass Google's CAPTCHA challenges? 09 Aug 2017 Security How did a Moodle security vulnerability enable remote code execution? 08 Aug 2017 Security How did flaws in WhatsApp and Telegram enable account takeovers? 07 Aug 2017 Security Samsung Knox platform: Can it improve Android device security? 28 Jul 2017 1 2 3 4