The Rise of Telemetry Architecture

There was a time not so long ago when you were at a party and another party goer asked the question “Oh, and what do you do for a living?” Odds are, their answer might have simply been something like “I’m an architect” and from that you could infer that they designed and authored blueprints … Continue reading The Rise of Telemetry Architecture

DOJ: Creep Coach Finagles Nude Athlete Photos

A former track-and-field coach who worked at several universities has been arrested and is facing up to five years in prison for attempting to solicit nude photos of his athletes through sham social-media accounts and cyberstalking. The Department of Justice alleged that Steve Waithe, while coaching at Northeastern University, would often ask his athletes to … Continue reading DOJ: Creep Coach Finagles Nude Athlete Photos

Network Detection & Response: The Next Frontier in Fighting the Human Problem

Justin Jett, director of audit and compliance for Plixer, discusses the transformation of network-traffic analytics and what it means for cybersecurity now. Last year, Gartner published a market guide on network detection and response (NDR). Formerly known as network-traffic analytics, which I’ve spoken about in the past at length, NDR has adapted to not only … Continue reading Network Detection & Response: The Next Frontier in Fighting the Human Problem

Azure Functions Weakness Allows Privilege Escalation

A privilege-escalation vulnerability Microsoft’s Azure Functions cloud container feature could ultimately allow a user to escape the container, according to researchers. Intezer researchers dubbed the bug “Royal Flush” after a flush-to-disk limitation that an exploit would need to evade. Flushing to disk means that data is handed off to the kernel, where it’s visible to … Continue reading Azure Functions Weakness Allows Privilege Escalation

NIST and HIPAA: Is There a Password Connection?

When dealing with user data, it's essential that we design our password policies around compliance. These policies are defined both internally and externally. While companies uphold their own password standards, outside forces like HIPAA and NIST have a heavy influence. Impacts are defined by industry and one's unique infrastructure. How do IT departments maintain compliance … Continue reading NIST and HIPAA: Is There a Password Connection?