News & Information


07/05/2022   Sophos Security
Running Chrome? Do the "Help-About-Update" dance move right now, just to be sure...
07/04/2022   Sophos Security
Bust in Canada, now bust in the USA as well.
07/04/2022   InfoWorld Security

In the software world, identity is the mapping of a person, place, or thing in a verifiable manner to a software resource. Whenever you interact with nearly anything on the internet, you are dealing with identities:

  • Facebook identity
  • Email address
  • Login name and password for a website

Everyone has multiple identities—multiple ways that people know who you are and interact with you in the virtual world. Here are a few of my identities:

  • Twitter: @leeatchison
  • LinkedIn: leeatchison
  • Email address:
  • Phone number: (360) ###-####

Each of these is a different way of identifying me to my friends, family, co-workers, partners, and vendors. You deal with identities all the time. Identities can represent more than people. Everything you interact with in the real world that has a presence in the virtual world has to deal with identity and identity management:

To read this article in full, please click here

07/01/2022   Sophos Security
The crooks hit us up with this phishing email less than half an hour after they activated their new scam domain.
07/01/2022   Sophos Security
The "Missing Cryptoqueen" makes the American Top Ten... but not in a good way.
06/30/2022   Sophos Security
Latest episode - listen and read now! Use our advice to advise your own friends and family... let's all do our bit to stand up to scammers!
06/29/2022   InfoWorld Security
Sysdig's Drift Control detects and stops attempts to run packages or binary files that were added or modified at runtime.
06/29/2022   Sophos Security
Firefox squashes a bug that helped phishers, and brings its own helping hand to Microsoft's "Follina" saga.
06/28/2022   InfoWorld Security

Talk about cloud security and you’re likely to discuss provider-focused issues: not enough security, not enough auditing, not enough planning. However, the biggest cloud security risks continue to be the people who walk beside you in the hallways. According to the latest “Top Threats to Cloud Computing” report by the Cloud Security Alliance on the HealthITSecurity website, the scary calls are coming from inside the house.

Based on a survey of more than 700 cybersecurity professionals, the report showed that the top 11 threats to cloud security include insecure interfaces and APIs, misconfigurations, lack of a cloud security architecture and strategy, as well as accidental cloud disclosure. The actual threats are not the bad actors sitting in an abandoned warehouse; it’s Mary in accounting, Robert in inventory IT, even Susan in IT security. 

To read this article in full, please click here

06/27/2022   Sophos Security
The crooks needed at least two private keys, each stored in two parts... but they got them anyway.
06/27/2022   Sophos Security
It's a simple jingle and it's solid advice: "If in doubt, don't give it out!"
06/27/2022   InfoWorld Security

The good news is that recession or no, security remains a somewhat uncuttable expense for CIOs, according to new data from Morgan Stanley Research. The bad news is that none of it will work if those same CIOs don’t patch their software. AWS Vice President Matt Wilson is absolutely correct when he argues, “It is the responsibility of the consumer of software deployed in security- or reliability-critical systems to safely patch it (among other things), or retain the services necessary to have it maintained for them.”

To read this article in full, please click here

06/27/2022   InfoWorld Security

Devops is primarily associated with the collaboration between developers and operations to improve the delivery and reliability of applications in production. The most common best practices aim to replace manual, error-prone procedures managed at the boundaries between dev and ops teams with more robust automations. These include automating the delivery pipeline with CI/CD (continuous integration and continuous delivery), standardizing configurations with containers, and configuring infrastructure as code. On the ops side, devops best practices to improve application reliability include improving apps’ observability, increasing monitoring, and automating cloud and infrastructure operations.

To read this article in full, please click here

06/24/2022   Sophos Security
Fortunately, it's not a major bugfix, which means it's easy to patch and can teach us all some useful lessons.
06/23/2022   Sophos Security
Latest epsiode - listen (or read) now!
06/21/2022   InfoWorld Security

Have you ever heard the saying “Locking the door but leaving the window unlatched”? It means that your security is only as good as the weakest link. This applies to IT as well.

How does legacy system security compare to cloud security? Google away and you’ll find that survey after survey says cloud security is superior or far superior to security on more traditional systems in data centers.

Why? We keep our legacy systems in our data centers, right? Doesn’t that make them more secure?

To read this article in full, please click here

06/20/2022   InfoWorld Security

Many companies have rushed to implement continuous integration and continuous delivery (CI/CD) pipelines to streamline their software development workflows. Far fewer have taken the additional step to automate continuous deployment, a practice of using CI/CD pipelines to push changes into production continuously. Understandably so.

The thought of pushing code to production as frequently as daily or hourly gives me the chills. In fact, several years ago, I wrote an article about the downsides of continuous deployment. Another article, "When should responsible devops teams increase deployment frequency," challenges the assumption that more frequent deployments are better.

To read this article in full, please click here

06/16/2022   InfoWorld Security
06/15/2022   InfoWorld Security

Security is a significant concern for Kubernetes and container-based development, according to Red Hat’s State of Kubernetes Security report for 2022.

In fact, 93% of survey respondents experienced at least one security incident in their Kubernetes and container environments in the past 12 months, sometimes leading to the loss of customers or revenue. This was likely the result of a variety of factors, including a lack of security knowledge about containers and Kubernetes, inadequate tools, and central security teams unable to keep up with application development teams. Red Hat also notes that Kubernetes and containers were designed for developer productivity, not necessarily security.

To read this article in full, please click here

06/14/2022   InfoWorld Security

The cloud native threat landscape is constantly evolving. Research from Aqua’s Team Nautilus in 2021 revealed higher levels of sophistication in attacks and an increase in volume of attacks targeting container infrastructure. The study showed that vulnerable containers could be exploited in less than an hour, underscoring the importance of visibility and real-time threat detection in cloud native environments. 

To be effective, threat detection must include the breadth of workloads for a cloud native environment, including containers, VMs, and serverless functions with the ability to detect the tactics used in attacks that target cloud native environments. Importantly, detection must occur in real time and be minimally disruptive to production. 

To read this article in full, please click here

06/07/2022   InfoWorld Security

Aiming to help Rust developers discover and prevent security vulnerabilities, GitHub has made its suite of supply chain security features available for the fast-growing Rust language.

These features include the GitHub Advisory Database, which already has more than 400 Rust security advisories, as well Dependabot alerts and updates, and dependency graph support, providing alerts on vulnerable dependencies in Rust’s Cargo package files. Rust users can report and ultimately prevent security vulnerabilities when using GitHub.

The GitHub Advisory Database is a database of security advisories focused on actionable vulnerability information for developers. The majority of vulnerabilities cited in the database come from RustSec, an organization that publishes security advisories related to Rust libraries. Rust package maintainers can use the security advisories to collaborate with vulnerability reporters to privately discuss and fix vulnerabilities prior to announcing them publicly. Developers can report Rust vulnerabilities with a CVE through a community contribution.

To read this article in full, please click here

06/06/2022   InfoWorld Security

Keeping your application safe and secure is critical to a successful enterprise. Whether you use cloud-native application architectures or on-premises systems—or anything in between—it’s generally considered that splitting your infrastructure into security zones is a best practice. These zones provide security isolation that keeps your applications and their data safe from outside bad actors. A security breach in one area can be limited to impact only the resources within that one area.

Done correctly, this zone-based isolation process can take a security breach that might otherwise be a massive impact to your application integrity, and turn it into a much smaller problem, perhaps an insignificant breach with minimal impact.

To read this article in full, please click here