Hackbits Powered by LIFARS – Episode 7: Cybersecurity SpotlightIt was a pleasure interviewing Paul Caiazzo. Paul is a cybersecurity expert, entrepreneur, strategist, CISO and CPO. Paul has dedicated... BLOG Hackbits host Gaspare Marturano interviews LIFARS Director of Global operations Bailey Saltz about careers in cybersecurity November 1, 2021 University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated... The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding... Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,... The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and... How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected... Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face... Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and... Understanding Firewalls For Home and Small Office Use February 28, 2020 Attacks are susceptible to happen when your computer is accessible through an internet connection or Wi-Fi network. Nevertheless, by using...
Hackbits Powered by LIFARS – Episode 7: Cybersecurity SpotlightIt was a pleasure interviewing Paul Caiazzo. Paul is a cybersecurity expert, entrepreneur, strategist, CISO and CPO. Paul has dedicated...
BLOG Hackbits host Gaspare Marturano interviews LIFARS Director of Global operations Bailey Saltz about careers in cybersecurity November 1, 2021 University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated... The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding... Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,... The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and... How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected... Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face... Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and... Understanding Firewalls For Home and Small Office Use February 28, 2020 Attacks are susceptible to happen when your computer is accessible through an internet connection or Wi-Fi network. Nevertheless, by using...
Hackbits host Gaspare Marturano interviews LIFARS Director of Global operations Bailey Saltz about careers in cybersecurity November 1, 2021
University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated...
The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding...
Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,...
The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and...
How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such...
How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected...
Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect...
Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that...
How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face...
Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...
Understanding Firewalls For Home and Small Office Use February 28, 2020 Attacks are susceptible to happen when your computer is accessible through an internet connection or Wi-Fi network. Nevertheless, by using...