Peer to Peer
Legacy IT: The hidden problem of digital transformation
December 28, 2020
Companies may want to undertake digital transformation, but often start with legacy servers built in the early 2000s. Today’s columnist, Hemanta Swaim, formerly of TiVo, offers some insights on how to secure legacy IT systems.
Attribution 2.0 Generic CC BY 2.0)
Identify legacy assets.
Leverage identity management.
Trust no one without verifying.
Security Weekly News SOHO Routers Redux, GPT-3, Proxy Shell, & Jason Wood – SWN #141
August 10, 2021
Application Security Weekly Router Auth Bypass, Weak IoT RNG, HTTP/2 Request Smuggling, & Kindle Fuzzing – ASW #161
August 9, 2021
Application Security Weekly Platform Firmware Security – Magggie Jauregui – ASW #160
August 2, 2021
Preparing Linux Hosts for Unexpected Threats
THU MAR 18