Remove Authentication Remove Authorization Remove Blog Remove Vulnerability
article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. What Is Threat Modeling?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

World Backup Day: Four Data Protection Best Practices to Know

Pure Storage

World Backup Day: Four Data Protection Best Practices to Know by Pure Storage Blog This article originally appeared on SolutionsReview.com. It has been republished with permission from the author. The post World Backup Day: Four Data Protection Best Practices to Know appeared first on Pure Storage Blog.

Backup 96
article thumbnail

How to Counter AI-Driven Cybersecurity Threats to Physical Security Products

Security Industry Association

In this blog from SIA Cybersecurity Advisory Board member Pauline Norstrom – founder and CEO of Anekanta Consulting – learn about mitigating artificial intelligence-driven cybersecurity threats to physical security products. AI can be used to automate the discovery and exploitation of zero-day vulnerabilities.

article thumbnail

How to Generate a CSR

Pure Storage

How to Generate a CSR by Pure Storage Blog To provide encrypted traffic using SSL/TLS between a client and a host server, companies must create a certificate signing request (CSR) and submit it to a certificate authority (CA). An OpenSSL bug was responsible for one of the biggest vulnerabilities on the open internet, Heartbleed.

article thumbnail

What is New with CBS Terraform Provider 0.9.0

Pure Storage

by Pure Storage Blog This article on CBS Terraform Provider 0.9.0 originally appeard on Adam Mazouz’s blog. It has been republished here with the author’s credit and consent. In this blog post, I will cover what is new with the latest version of the Pure Cloud Block Store Terraform Provider.

article thumbnail

Guest Post: “I’ve Upgraded My Credentials. My Facility Is Safe Now, Right?”

Security Industry Association

Most employees will take their credentials home with them when they leave their facility, and once the employees are outside the secured environment, a secure credential is protected from many of the types of attacks vulnerable credentials are prone to. 1038 combinations), such as adding devices between readers and controllers.