Does it matter if iptables isn't running on my honeypot?, (Thu, Apr 25th)
I've been working on comparing data from different DShield [1] honeypots to understand differences when the honeypots reside on different networks. One point of comparison is malware submitted to the honeypots. During a review of the...
Transforming Tech: Why Leadership Must Start with Our Girls in STEM
We celebrate Girls in ICT Day by empowering the next generation of women leaders in STEM and ensuring they have everything needed to lead and innovate. Together, we can close the gender gap in technology and cultivate a future rich in diversity and...
Attacker Social-Engineered Backdoor Code Into XZ Utils
Unlike the SolarWinds and CodeCov incidents, all that it took for an adversary to nearly pull off a massive supply chain attack was some slick social engineering and a string of pressure emails.
Product manager Julie Nguyen explores how Cisco Meraki Switches help equip businesses with a centralized, connected, and stable networking environment.