krook
2 TopicsLightboard Lessons: Secure Cloud Architecture
Businesses are moving their web applications to the cloud. And very typically they deploy apps in multi-clouds. There are benefits to moving to the cloud...like reduced expenses, faster deployment, and higher elasticity. But there are also many things to consider when deploying apps in the cloud. One of the biggest things to consider is security. How can you effectively secure your web applications when they are dispersed in so many cloud locations? And, how can you keep a consistent security policy across all your applications? You need a secure cloud architecture to provide a solid foundation for how you provide security for applications in the cloud. In this video, we discuss an approach to architecting your cloud environment and we provide good tips to help you keep your apps secure while you enjoy all the many benefits of the cloud. Check out the video to learn more about it! Related Resources: https://www.f5.com/solutions/secure-cloud-architecture1KViews1like0CommentsLightboard Lessons: Explaining the Kr00k vulnerability
Researchers atESETdiscovered a previously unknown vulnerability in Wi-Fi chips and named it "Kr00k". This is similar in some ways (but not similar in other ways) to the KRACK vulnerability that hit WiFi routers a couple of years ago. The Kr00k vulnerability, assignedCVE-2019-15126, allows attackers to steal data that is sent between an end device (phone, laptop, tablet, etc) and a wireless router.It takes advantage of encryption keys that can be forcibly set to all zeroes, thus allowing the attacker to decrypt the information sent to/from your wireless device.This vulnerability is estimated to affect more than 1 Billion devices worldwide.Check out the video to learn more about it!414Views1like0Comments