Remove Apple Remove Load Balancer Remove Malware Remove Security
article thumbnail

Technology Short Take 151

Scott Lowe

Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. Cross-platform malware. Orca Security discusses the “Superglue” vulnerability in AWS Glue. What do you think microsegmentation means ?

article thumbnail

Technology Short Take 144

Scott Lowe

Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Sentinel Labs outlines a major malware push that is bypassing Apple’s malware protections. (And since Kevin didn’t define TDP—shame, shame!—see

Linux 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 144

Scott Lowe

Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Sentinel Labs outlines a major malware push that is bypassing Apple’s malware protections. (And since Kevin didn’t define TDP—shame, shame!—see

Linux 60
article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Apple Podcasts. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. What’s a good entry point for starting CTFs or information security for that matter?

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Apple Podcasts. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. What’s a good entry point for starting CTFs or information security for that matter?