ITNE: Security, Humor, Operations, Virtualization, DDN, Salesforce, Fortinet, CxO Security Events (313.4.5)
Volume 313, Issue 4: Apr 22nd, 2024 — Apr 28th, 2024
Security
Humor
Operations
Virtualization
DDN News
Salesforce News
Fortinet News
CxO Security Events
A Pain in the NAS: Exploiting Cloud Connectivity to PWN Your NAS (May 16th)
Least Privilege Reality Check: Refining Cloud Access and Permissions (May 16th)
Security
The 5 Best Practices for PCI DSS Compliance
When you're working towards getting (and staying) compliant, it's only natural to want to make extra sure that you're doing it right....more
To Catch A Cybercriminal - And The Fallout That Follows
How does law enforcement identify the people behind cybercrimes, and what happens afterward?...more
What Is Penetration Testing: A Comprehensive Business Guide
Penetration testing, or pen testing for short, is a critical way to protect IT systems and sensitive data from malicious activity proactively. This guide provides a comprehensive overview of how this technique works, business benefits, its types, methodologies, costs, and everything in between....more
Humor
Help! My Mouse Climbed A Wall And Now It Doesn't Work Right
Support chap learns users will try to solve problems in non-obvious ways...more
Operations
Open Compute Project Foundation and iMasons Announce New Collaboration
The Open Compute Project Foundation (OCP), the nonprofit organization bringing hyperscale innovations to all, and infrastructure Masons (iMasons), a nonprofit professional association of individuals connected and empowered to build a greater digital future for all, announce a new collaboration related to sustainability initiatives centered on the iMasons Climate Accord (ICA)....more
What Is High Availability (HA)?
High availability (HA) is the ability of a system to operate continuously for a designated period of time even if components within the system fail. A highly available system meets an agreed-upon operational performance level by eliminating single points of failure....more
Virtualization
The Essential KVM Cheat Sheet for System Administrators
KVM (Kernel-based Virtual Machine) is a powerful open-source virtualization technology built into the Linux kernel. It allows you to create and manage virtual machines (VMs) on Linux systems. For Linux administrators, mastering KVM commands and their options is necessary for efficient virtualization management...more
DDN News
DDN Selected By Jump Trading To Accelerate AI Quantitative Trading At Massive Scale
DDN's High-Performance Storage Solutions Enhance Jump Trading's Cutting-Edge AI and Machine Learning Capabilities for Competitive Advantage in Global Financial Markets...more
Salesforce News
IHG Hotels & Resorts Aims To Boost Guest Loyalty With Salesforce
IHG Hotels & Resorts will become the first global hospitality company to standardize on Salesforce Loyalty Management...more
Salesforce Unveils Zero Copy Partner Network, An Ecosystem Committed To Secure, Bidirectional Zero Copy Integration With Salesforce Data Cloud
The Zero Copy Partner Network features initial partners Amazon Web Services (AWS), Databricks, Google Cloud, and Snowflake, and adds Microsoft, all committed to zero copy integrations with Salesforce that give customers a secure and cost-effective way to connect and take action on all of their data...more
Fortinet News
Zero-Trust Adoption Across Government
At federal agencies, the COVID-19 pandemic and the shift to remote work in conjunction with Executive Order (EO) 14028 in 2021 accelerated the adoption of zero-trust principles, emphasizing the need for secure and efficient operations outside traditional office environments. Although the zero-trust security paradigm had been discussed and partially implemented in organizations before 2021, the EO was the catalyst for agencies to take systematic action....more
Is Zero Trust Right For OT, Right Now?
A major shift is happening in organizations with operational technology (OT) networks used in environments such as factories and critical infrastructure....more
Key Findings From The 2024 Cloud Security Report
As organizations develop and deploy more cloud applications, security becomes more complicated. Many organizations are adopting a hybrid or multi-cloud approach, which has expanded the attack surface and increased complexity....more
CxO Security Events
A Pain in the NAS: Exploiting Cloud Connectivity to PWN Your NAS (May 16th)
In this talk, we will explain the pairing process of WD and Synology NAS. We will elaborate on the overall architecture of their cloud offering and focus on the vulnerabilities we found including ways to enumerate and impersonate all edge devices using certificate transparency log (CTL), and steal cloud proxy auth tokens....more
Least Privilege Reality Check: Refining Cloud Access and Permissions (May 16th)
Tackling least privilege in cloud environments is complex; with over 42,000 permissions to manage, tens of accounts, and thousands of identities to create policies for, traditional least privilege is not only impractical, but feels hopeless....more
How to Amplify DevOps with DevSecOps (May 22nd)
Some dev and security teams mix it up in all the wrong ways - whether that's in constant clashes or in unintentional operational shortfalls. Either way, it's time to batten the hatches and unite the crew. This webinar shares ways to do that by amplifying the advantages in DevOps and transitioning them to DevSecOps....more