‘I love Apple products, I just wish they were secure’ A former NSA staffer turned security researcher is warning that bypassing typical OS X security tools is trivial. Patrick Wardle, a former NSA staffer and NASA intern who now heads up research at crowd-sourced security intelligence firm Synack, found that […]
Juniper’s Junosphere and Cisco Learning Labs offer broader access to network gear firmware, but engineers want something they can run locally, much like illicit router emulator software. Both Cisco Systems and Juniper Networks are launching cloud-based network labs—Cisco Learning Labs andJunosphere—to give network engineers and students better access to the […]
APM First official operations guide is released https://support.f5.com/kb/en-us/products/big-ip_apm/manuals/product/f5-apm-operations-guide.html f5-apm-operations-guide.pdf
Thanks to the Charlie Hebdo massacre and other instances of terrorism, the French legislature has voted 438 to 86 in favor of the “Intelligence Service Bill,” essentially a French version of the Patriot Act. It awards the French intelligence services sweeping powers to tap and intercept any kind of digital […]
The problem with SSL termination is that all traffic getting to your web application is now over HTTP. This is a problem because often times security checks on the page will enforce an HTTPS connection and possibly attempt to redirect the user to HTTPS. In order for the application to […]
Introducing FIDO: Automated Security Incident Response We’re excited to announce the open source release of FIDO (Fully Integrated Defense Operation – apologies to the FIDO Alliance for acronym collision), our system for automatically analyzing security events and responding to security incidents. Overview The typical process for investigating security-related alerts is […]
What issues on firewalls have you run into lately?