Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


DevSecOps tutorial: What is it, and how can it improve application security?

Dr. David Brumley, a professor at Carnegie Mellon University and CEO of ForAllSecure, explains what DevSecOps is and how companies can use it to improve application security by designing security in from the start.  Read interview…


How cybersecurity has changed since the corona virus outbreak began, and what it means for businesses

Moving employees to a work-from-home model means your security infrastructure has to change quickly. Some recent breaches highlight the importance of cybersecurity.


How to organize your security team: The evolution of cybersecurity

Digital transformation, cloud computing, and an expanding threat landscape are changing how organizations approach security. Explore security roles and functions, and discover how they are evolving to handle today’s security needs.  A great article on security team development from Microsoft.


Why & Where You Should You Plant Your Flag

Several stories here have highlighted the importance of creating accounts online tied to your various identity, financial and communications services before identity thieves do it for you. This post examines some of the key places where everyone should plant their virtual flags.

If you are one of those people who “never does anything online’ and thinks that somehow makes you more secure, this article from noted security writer Brian Krebs shows yo why you should set up your online accounts, especially email, banking and financial accounts, before the bad guys do it for you.


How Malicious Tor Relays are Exploiting Users in 2020 (Part I)

[More than] 23% of the Tor network’s exit capacity has been attacking Tor users.  This is a deeply concerning situation for anyone using the TOR relay service.  Give it a read if it applies to you.


AI fighter pilot vs. Air Force pilot: Dogfight showdown

This week, DARPA is conducting its third AlphaDogfight Trials. The winning AI will be pitted against a human pilot in a human vs. algorithm aerial showdown.


 

0

About the Author:

I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.