Sean Michael Kerner Avatar
  • How Netflix Secures AWS Cloud Credentials

    LAS VEGAS – Netflix has long been the poster child for being an “all-in-the-cloud” organization. The streaming media service relies on Amazon Web Services (AWS) for infrastructure and computing resources that it uses to operate. With AWS being a public cloud, resources can be shared and there are also multiple sets of credentials and access […]

  • With So Many Eyeballs, Is Open Source Security Better?

    Back in 1999, Eric Raymond coined the term “Linus’ Law,” which stipulates that given enough eyeballs, all bugs are shallow. Linus’ Law, named in honor of Linux creator Linus Torvalds, has for nearly two decades been used by some as a doctrine to explain why open source software should have better security. In recent years, […]

  • How to Secure Edge Computing

    The notion of edge computing is a relatively nascent one in modern IT. While end user, data center and cloud computing are well understood, Edge computing is still struggling to define itself – and come to terms with some significant security challenges. At the OpenStack Summit in Vancouver on May 23, a panel of experts […]

  • Why Avast Gives Security Software Away for Free

    There are a lot of different security technologies for consumers, and most of them cost money to use. Avast is an exception to that norm, offering fully-functional, free anti-virus security technology to consumers – but why do they do it? In a video interview from the show floor of last week’s RSA Conference, Ondrej Vlcek, […]

  • How to Defend Servers Against Cryptojacking

    Cryptojacking has become one of the most active and pervasive threats in recent years. In a cryptojacking attack, a cryptocurrency mining script is injected into a server or a webpage to take advantage of the victim system’s CPU power. The first article in this series defined cryptojacking and why it is a cybersecurity risk. In […]

  • What is a Bug Bounty? How to Set Up a Bug Bounty Program

    Bugs exist in software. That’s a fact, not a controversial statement. The challenge (and controversy) lies in how different organizations find the bugs in their software. One way for organizations to find bugs is with a bug bounty program. Bug bounties are not a panacea or cure-all for finding and eliminating software flaws, but they […]

  • What is Cryptojacking and Why Is It a Cybersecurity Risk?

    Are your systems running slower than they should? Perhaps a certain web page is more sluggish than usual and your system seems to lag. Be concerned – you could potentially be a victim of a cryptojacking campaign. Cryptojacking is a relatively new term and is a class of attack that gained significant momentum in the […]

  • Hacking Blockchain with Smart Contracts to Control a Botnet

      TORONTO — Blockchain has been hailed by some in the technology industry as a potential method to help improve cyber security. However, security researcher Majid Malaika warns that Blockchain can potentially be abused to enable a new form of botnet that would be very difficult to take down. Malaika detailed his Blockchain-powered botnet in […]

  • WordPress 4.8.3 Fixes Critical SQL Injection Vulnerability

    Boo! On Oct. 31, the open-source WordPress content management (CMS) and blogging platform released its 4.8.3 update, patching a frightening SQL Injection security vulnerability that was left open for weeks. “WordPress versions 4.8.2 and earlier are affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi),” WordPress […]

  • New Research Sheds Light on the Mirai Botnet

    New research presented at the USENIX conference is providing deep insight into the evolution of the Mirai botnet over a seven-month period. The Mirai botnet first achieved notoriety in September 2016 after attacking the site of a popular security blogger and hosting provider OVH with nearly 1 Terabit per second of Distributed Denial of Service […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis