Author: nlqip

The Colonial Pipeline ransomware attack took down the largest fuel pipeline in the United States and resulted in consumer hoarding of fuel and a short-term shortage of gasoline on the east coast of the U.S.. While pipeline systems were not directly infected with ransomware, the pipeline was shut down as a precaution during the investigation…

Read More

October is Cybersecurity Awareness Month and Breast Cancer Awareness Month. Since this is a cybersecurity blog, we will focus on cybersecurity but let’s take a moment to talk about the important topic of breast cancer. On September 30th, President Biden proclaimed October 2021 as National Breast Cancer Awareness Month. Biden’s proclamation states that 1 in…

Read More

Last year, Humble Bundle teamed up with the great tech publisher, No Starch Press, to offer deeply discounted hacking ebooks for as little as one dollar with the Hacking 101 By No Starch Press Humble Bundle of ebooks. This year, on Giving Tuesday, No Starch Press has a new Hacking Book Bundle. The regular cost…

Read More

Last Update: December 28, 2021 If you are reading this, you likely have heard about Log4Shell, the December, 2021 critical zero-day remote-code execution vulnerability, and subsequent vulnerabilities in the popular Log4j software library that is developed and maintained by the Apache Software Foundation. Apache has patched these vulnerabilities in version 2.17.1, however vendors who use…

Read More

[Links and resources updated on October 4, 2022] If you told me a year ago that I would meet a cold war hero at a birthday party, I wouldn’t have believed you. And I would be even more skeptical if you told me she would be an unintimidating, approachable music professor with an infectious smile.…

Read More

From what enterprises are seeing around GenAI ROI and the most popular GenAI use cases today, to the majority of enterprises using ChatGPT for software development, CRN breaks down the biggest results from ISG’s new 2024 State of The Generative AI Market report. Enterprises are spending on average $2.6 billion on their single largest generative…

Read More

So, here’s something that blew my mind: I decided to test Google’s NotebookLM AI tool. I casually uploaded the URLs for my LinkedIn page and my blog, not expecting much more than a basic summary. After about 3–4 minutes of AI whirring away, I had…a podcast in the form of a WAV file. Curious, I clicked…

Read More

Guy Guzner, a cybersecurity vet and CEO of SaaS identity security startup Savvy, tells CRN that adopting better security practices can also make life easier for workers. While few workers have ever enjoyed needing to interact with their cybersecurity team over a minor issue, the feeling is often mutual. The reality is that most security…

Read More

DAST vulnerability scanners are not that different from virus scanners. In both cases, the goal of the software is to find something out of the ordinary in the target. A virus scanner scans a computer’s local resources and storage to find potentially malicious software. A vulnerability scanner scans some kind of target to find potentially…

Read More

To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs, and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look at your options and the reasons why DAST is a…

Read More