Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Approximately 1.2 billion records on an unsecured Google Cloud Services database were found on the web. Vinny Troia, a cybersecurity researcher with a focus on the Dark Web, found 1.2 billion records on an unsecured server. A total of 4 terabytes of personal...
An In Depth Look at ThreatModeling: What Programmers Need to Know

An In Depth Look at ThreatModeling: What Programmers Need to Know

Nowadays, organizations are shifting their focus from DevOps – an approach to the software development life cycle (SDLC), which applies to the origin of a project, through deployment. Within SDLC, the DevSecOps approach integrates security as early as the planning...
Collateral Damage of an Online Membership Data Breach

Collateral Damage of an Online Membership Data Breach

Previously we highlighted the potential harm to individuals that could result from a data breach involving Social Security numbers. Now, let’s consider the potential collateral damage that can occur if your private data is exposed in an online membership information...
Financial Services Moving to the Hybrid Cloud

Financial Services Moving to the Hybrid Cloud

Increasingly, the financial services industry is migrating to the cloud for their content storage needs. Cloud storage occurs in physical storage and can be stored in private, public or hybrid facilities. But before we get detail in the nuances and strategic...
Our Guide to IoT UART Security Protocols

Our Guide to IoT UART Security Protocols

A universal asynchronous receiver/transmitter (UART) is a hardware device with circuitry that facilitates communication between parallel and serial interfaces. These interfaces transmit data, as a single stream of bits, between two systems. Parallel and serial...