Blockchain Data Management
In my last blog, I provided a brief on the basics of blockchain. In this blog, I will try to further explore how the actual data gets …
In my last blog, I provided a brief on the basics of blockchain. In this blog, I will try to further explore how the actual data gets …
Blockchain or DLT (Distributed Ledger Technology) is getting good traction in the IT world these days. Earlier, this technology was being …
This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any …
Why are we so good at identifying attacks but so bad at preventing them? Every day, we hear of new organizations getting hacked or old …
A new malvertising chain that uses multiple payloads to steal confidential information from the victim’s machine and to encrypt their …
The Pathé Gaumont Champs-Elysées cinema in Paris (Photo: Thomas van de Weerd, via Flickr/CC) Step one for not falling victim to business …
From 2009, when Satoshi Nakamoto implemented blockchain technology as a core component in Bitcoin, blockchain has been the buzzword in the …
Recipe Unlimited, a publicly traded company that operates nearly 1,400 restaurants under 19 different brands in Canada, has experienced …
The early phases of the traditional cyber kill chain are merging as criminals seek out faster ways to launch targeted attacks, a new report …
You may have seen my posting on East/West is the New North/South. The bottom line is that traditional API Gateway models simply don’t …
Hackers advertising and selling more than 200 million highly sensitive data in a Dark web forum that was stolen from the China-based hotel …
There is no lack of buzz around blockchain. Though commonly known in relation to cryptocurrencies, blockchain is moving beyond financial …
The cyberattack occurred sometime between Nov. 3, 2017, and Jan. 2, 2018. The culprits “were able to access and potentially obtain payment card information used to make purchases in certain Cheddar’s Scratch Kitchen restaurants” in some states, …
PHP unserialization attacks have been well known for some time, but a new exploitation method explained last week at Black Hat USA in Las …
Have you wondered if it is possible to code your own blockchain with less than 200 lines of Go? If you find this question intriguing, then, …
Until recently, one of the biggest challenges for cybercriminals has been matching a target with an exploit. While newer attacks might be …
CISOs are notoriously risk-averse and compliance-focused, providing policies for IT and development teams to enforce. By contrast, in the …
Last week I attended Arm TechCon 2017 in Santa Clara. Featuring over 100 speakers, the Arm Holdings’ multiday conference provided an …