Tag Archive for: securing

Experts on securing the public cloud


Cloud computing’s velocity and dynamism make it hard for security teams to monitor and protect workloads in the cloud without impeding the agility of dev teams. ExtraHop Senior Principal Data Scientist Edward Wu joins ESW to discuss practical deployment approaches and scenarios to facilitate gathering and utilizing network data in cloud environment…

Source…

Organizing And Securing Your Device


Android is the world’s most popular mobile operating system. It’s open-source, allowing for plenty of customization, control, and freedom. As such, there’s no shortage of apps you can install to boost your user experience.

This article will focus on Android apps you can use for organizing and securing your device.

Note-taking

Without even realizing it, note-taking is an almost-everyday activity on your phone. Notes help you remember the important things without thinking about them constantly. Notes can go far beyond plain text. Some apps let you write with a stylus or even scribble, turning your smartphone into a digital notebook.

Calendar

Staying on top of what you need to do is essential for everything from your job to your personal life. Updating a calendar with events and tasks for each day is an easy way to improve your productivity.

Android comes with a built-in calendar, but you might want to explore the Play Store for another one that better fits your needs. The Google Calendar is a safe option that works great for most tasks, particularly everyday life and work-related. You can always download a more activity-specific calendar as well, for example, for tracking your days at the gym.

Password manager

A big part of securing your device is protecting your online accounts, especially those containing sensitive information. A password manager is a very handy tool to have on Android. It will not only help you practice safe password hygiene by generating strong passwords, but it will also help you log into your apps quicker. Android comes with the Google Smart Lock, which should be enough for most people. But you can find other great and more secure password managers on the Play Store.

Advanced mobile security app

The days of simple antivirus software are almost gone. Now, developers have advanced solutions that incorporate several security measures, including:

  • Scanning
  • Phishing detection
  • Fraud and spam call blocking
  • System updates, and more depending on which app.

In a world where cyber threats are rampant, having an advanced mobile security app behind your back can make a huge difference.

Workflow management

Listing your tasks on a calendar or notepad is better than nothing, but you…

Source…

Securing Electric Vehicle Charging Platforms


Automotive technology concept. Electric vehicle charging overlaid with automotive icons

Spikes in the prices of fossil fuels have provided yet another incentive for consumers to move towards electric vehicles (EVs). Alongside that trend is the pressing requirement to have a charging infrastructure which provides enough capacity to satisfy this need. In this article we will explore how EV charging platforms are being architected and deployed while answering a question seldom asked – what security holes are being opened?

DevOps Experience 2022

Are EV Charging Platforms Already Being Targeted?

The simple answer to that is yes. Typically what we see when new digital services such as EV charging come online is that initially there are a few attacks, mainly by independent researchers. These gain some publicity and although any issues raised normally get dealt with by the providers, it is often stated that the scenarios exposed are ‘academic’ so they may be taken seriously from a marketing perspective but not from a technical perspective. 

Although it may sometimes be difficult to see how the early attack vectors which are identified would result in a meaningful gain for a hacker, in my opinion it’s more common that you think that the exposed security hole is real. In other words, even if it is ‘academic’ it is still indicative of non-optimal security practices within the vendor’s operation. As such these reports should absolutely be taken seriously.

Let’s look at some recent examples of reported attacks against EV charging platform and see what trends we can see:

Source…