How I Got Started: SOC Analyst

The role of a Security Operations Center (SOC) analyst is crucial in maintaining an organization’s security posture. A SOC analyst wears many hats but typically acts as a watchdog looking out for attacks in progress while also finding ways to…

#RSAC: Cyber-Attacks on Civilian Infrastructure Should Be War Crimes, says Ukraine Official

Speaking during RSA, a Ukrainian official called for cyber-attacks against civilian infrastructure to be classed as war crimes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Cyber-Attacks on Civilian Infrastructure Should Be War Crimes, says Ukraine…

Intel allows Google to hack its servers

Intel gave permission to Google to hack its servers operating on its new security hardware product dubbed “Trust Domain Extensions” (TDX). According to sources reporting to our cybersecurity insiders, permission to infiltrate its servers was given almost 10 months ago…

#RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking

At RSA, cybersecurity experts discussed the unique nature of software supply chain attacks and approaches to tackling this growing threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking