The Latest

Would you leave your family for three years to go on a mission to Mars? Normally that would be an easy no, but I haven’t been alone since March 11, so the prospect sounds... slightly attractive. If nothing else, I may at least enjoy the experience vicariously with Away, a new Netflix series premiering Sept. 4.

Two-time Oscar winner Hilary Swank makes her prestige TV debut in the series about a woman who chooses to set off for the Red Planet, leaving her husband and teenage daughter behind on Earth. Drama, tragedy, and much tearful caressing of faces on computer screens ensues, both in space and on the ground. The show comes to us from creator Andrew Hinderaker and producers Matt Reeves (The Martian) and Jason Katims (Friday Night Lights), and the trailer promises exactly what you would expect from this scenario and these creators: Parenthood meets Gravity.

Here’s everything coming to and leaving the streaming service this week, including I’m Thinking of Ending Things (Sept. 4), a truly trippy-looking new movie from writer-director Charlie Kaufman (Eternal Sunshine of the Spotless Mind, Synecdoche, New York).

Available August 31

  • Casino Royale
  • Quantum of Solace

Available September 1

Available September 2

Available September 3

Available September 4

Leaving September 4

Leaving September 5

  • Once Upon a Time: Seasons 1-7

from Lifehacker https://ift.tt/31ILyUh
Photo: Robyn Mackenzie (Shutterstock)

Grinding your own spices is one of the easiest ways to improve the flavor of your meals. Grinding them as you need them means they last longer and taste better, and whole spices are often significantly cheaper per ounce than the little jars of pre-ground at the grocery store. But whether you use a mortar and pestle or a repurposed coffee grinder, it’s surprisingly difficult to grind spices as finely as you’d like.

A little texture is nice in spice rubs or DIY seasoning salts, but most dishes are definitely not improved by big chunks of dried spices. This is where a regular old fine mesh sieve comes in handy. Running your ground spices through a sieve might sound excessively finicky, but in reality, it adds all of 30 seconds to the process and noticeably improves the final texture. If you’re already putting in the effort to grind your own spices, I say go all out—if that can even apply to something so quick and easy.

The technique here is pretty self-explanatory, but I have one more hot tip: Sift freshly-ground spices directly onto a sheet of parchment paper. It’s tricky to control the direction of spice particles flying through a sieve, and a piece of parchment is a nice, big target. When you’re done, just fold the paper lengthwise and pour the contents into a storage container. Repeat until your cabinet is stocked with fresh, perfectly-ground spices. (Though don’t grind too much at a time; the whole point is that they’re fresh.)


from Lifehacker https://ift.tt/3lAKedS
Best Tech DealsBest Tech DealsThe best tech deals from around the web, updated daily.

Save on Razer Gaming Laptops and Equipment | Amazon Gold Box

Amazon is hosting a big one-day Razer sale with steep discounts on peripherals and accessories. But first, if you’ve lost drool over the amazing Razer Blade gaming laptop, now’s the time to consider buying. The base model starts at $2300, but you can save $200 today. You’ll be rocking some of the most advanced technology to grace a laptop, including a 4K OLED panel, 10th-gen Intel circuitry, an RTX 2070 MAX-Q, 16GB of RAM, the latest wired and wireless connectivity options, all in a sleek aluminum unibody.

Elsewhere, you can pick up the Razer Tartarus v2 with its 32 programmable keys for $60. It could be the perfect companion in RPGs or next to your flight stick for some Flight Simulator fun. If your needs are simpler, the Razer Mamba is one of the most comfortable and accurate mice around, and it’s sporting a cool Gears of War theme for only $54. The lag-free Razer Thresher wireless headset also keeps you immersed without being bound by USB, and it’s down to $80 today.

Shop the full sale at Amazon.

G/O Media may get a commission



from Lifehacker https://ift.tt/34Ogogf
Our recent articles and videos, all in one place.
from Naked Security https://ift.tt/32IbFtE

Seny Kamara gave an excellent keynote talk this year at the (online) CRYPTO Conference. He talked about solving real-world crypto problems for marginalized communities around the world, instead of crypto problems for governments and corporations. Well worth watching and listening to.


from Schneier on Security https://ift.tt/2YQTcKh

Today’s organizations desire the accessibility and flexibility of the cloud, yet these benefits ultimately mean little if you’re not operating securely. One misconfigured server and your company may be looking at financial or reputational damage that takes years to overcome.

critical cloud security challenges

Fortunately, there’s no reason why cloud computing can’t be done securely. You need to recognize the most critical cloud security challenges and develop a strategy for minimizing these risks. By doing so, you can get ahead of problems before they start, and help ensure that your security posture is strong enough to keep your core assets safe in any environment.

With that in mind, let’s dive into the five most pressing cloud security challenges faced by modern organizations.

1. The perils of cloud migration

According to Gartner, the shift to cloud computing will generate roughly $1.3 trillion in IT spending by 2022. The vast majority of enterprise workloads are now run on public, private or hybrid cloud environments.

Yet if organizations heedlessly race to migrate without making security a primary consideration, critical assets can be left unprotected and exposed to potential compromise. To ensure that migration does not create unnecessary risks, it’s important to:

  • Migrate in stages, beginning with non-critical or redundant data. Mistakes are often more likely to occur earlier in the process. So, begin moving data that won’t lead to damaging consequences to the enterprise in case it gets corrupted or erased.
  • Fully understand your cloud provider’s security practices. Go beyond “trust by reputation” and really dig into how your data is stored and protected.
  • Maintain operational continuity and data integrity. Once migration occurs, it’s important to ensure that controls are still functioning and there is no disruption to business operations.
  • Manage risk associated with the lack of visibility and control during migration. One effective way to manage risk during transition is to use breach and attack simulation software. These automated solutions launch continuous, simulated attacks to view your environment through the eyes of an adversary by identifying hidden vulnerabilities, misconfigurations and user activity that can be leveraged for malicious gain. This continuous monitoring provides a significant advantage during migration – a time when IT staff are often stretched thin, learning new concepts and operating with less visibility into key assets.

2. The need to master identity and access management (IAM)

Effectively managing and defining the roles, privileges and responsibilities of various network users is a critical objective for maintaining robust security. This means giving the right users the right access to the right assets in the appropriate context.

As workers come and go and roles change, this mandate can be quite a challenge, especially in the context of the cloud, where data can be accessed from anywhere. Fortunately, technology has improved our ability to track activities, adjust roles and enforce policies in a way that minimizes risk.

Today’s organizations have no shortage of end-to-end solutions for identity governance and management. Yet it’s important to understand that these tools alone are not the answer. No governance or management product can provide perfect protection as organizations are eternally at the mercy of human error. To help support smart identity and access management, it’s critical to have a layered and active approach to managing and mitigating security vulnerabilities that will inevitably arise.

Taking steps like practicing the principle of least privilege by permitting only the minimal amount of access necessary to perform tasks will greatly enhance your security posture.

3. The risks posed by vendor relationships

The explosive growth of cloud computing has highlighted new and deeper relationships between businesses and vendors, as organizations seek to maximize efficiencies through outsourcing and vendors assume more important roles in business operations. Effectively managing vendor relations within the context of the cloud is a core challenge for businesses moving forward.

Why? Because integrating third-party vendors often substantially raises cybersecurity risk. A Ponemon institute study in 2018 noted that nearly 60% of companies surveyed had encountered a breach due to a third-party. APT groups have adopted a strategy of targeting large enterprises via such smaller partners, where security is often weaker. Adversaries know you’re only as strong as your weakest link and take the least path of resistance to compromise assets. Due to this, it is incumbent upon today’s organizations to vigorously and securely manage third-party vendor relations in the cloud. This means developing appropriate guidance for SaaS operations (including sourcing and procurement solutions) and undertaking periodic vendor security evaluations.

4. The problem of insecure APIs

APIs are the key to successful cloud integration and interoperability. Yet insecure APIs are also one of the most significant threats to cloud security. Adversaries can exploit an open line of communication and steal valuable private data by compromising APIs. How often does this really occur? Consider this: By 2022, Gartner predicts insecure APIs will be the vector most commonly used to target enterprise application data.

With APIs growing ever more critical, attackers will continue to use tactics such as exploiting inadequate authentications or planting vulnerabilities within open source code, creating the possibility of devastating supply chain attacks. To minimize the odds of this occurring, developers should design APIs with proper authentication and access control in mind and seek to maintain as much visibility as possible into the enterprise security environment. This will allow for the quick identification and remediation of such API risks.

5. Dealing with limited user visibility

We’ve mentioned visibility on multiple occasions in this article – and for good reason. It is one of the keys to operating securely in the cloud. The ability to tell friend from foe (or authorized user from unauthorized user) is a prerequisite for protecting the cloud. Unfortunately, that’s a challenging task as cloud environments grow larger, busier and more complex.

Controlling shadow IT and maintaining better user visibility via behavior analytics and other tools should be a top priority for organizations. Given the lack of visibility across many contexts within cloud environments, it’s a smart play to develop a security posture that is dedicated to continuous improvement and supported by continuous testing and monitoring.

Critical cloud security challenges: The takeaway

Cloud security is achievable as long as you understand, anticipate and address the most significant challenges posed by migration and operation. By following the ideas outlined above, your organization will be in a much stronger position to prevent and defeat even the most determined adversaries.


from Help Net Security https://ift.tt/3bnhAsh

Traditional endpoint detection and response (EDR) solutions focus only on endpoint activity to detect attacks. As a result, they lack the context to analyze attacks accurately.

In this interview, Sumedh Thakar, President and Chief Product Officer, illustrates how Qualys fills the gaps by introducing a new multi-vector approach and the unifying power of its Cloud Platform to EDR, providing essential context and visibility to the entire attack chain.

Qualys Multi-Vector EDR

How does Qualys Multi-Vector EDR differ from traditional EDR solutions?

Traditional EDR solutions focus only on endpoint activity, which lacks the context necessary to accurately analyze attacks and leads to a high rate of false positives. This can put an unnecessary burden on incident response teams and requires the use of multiple point solutions to make sense of it all.

Qualys Multi-Vector EDR leverages the strength of EDR while also extending the visibility and capabilities beyond the endpoint to provide a more comprehensive approach to protection. Multi-Vector EDR integrates with the Qualys Cloud Platform to deliver vital context and visibility into the entire attack chain while dramatically reducing the number of false positives and negatives as compared with traditional EDR.

This integration unifies multiple context vectors like asset discovery, rich normalized software inventory, end-of-life visibility, vulnerabilities and exploits, misconfigurations, in-depth endpoint telemetry and network reachability all correlated for assessment, detection and response in a single app. It provides threat hunters and incident response teams with crucial, real-time insight into what is happening on the endpoint.

Vectors and attack surfaces have multiplied. How do we protect these systems?

Many attacks today are multi-faceted. The suspicious or malicious activity detected at the endpoint is often only one small part of a larger, more complex attack. Companies need visibility across the environment to effectively fully understand the attack and its impact on the endpoint—as well as the potential consequences elsewhere on their network. This is where Qualys’ ability to gather and assess the contextual data on any asset via Qualys Global IT Asset Inventory becomes so important.

The goal of EDR is detection and response, but you need a holistic view to do it effectively. When a threat or suspicious activity is detected, you need to act quickly to understand what the information or indicator means, and how you can pivot to take action to prevent any further compromise.

Qualys unveils Multi-Vector EDR

How can security teams take advantage of Qualys Multi-Vector EDR?

Attack prevention and detection are two sides of the same coin for security teams. With current endpoint tools focusing solely on endpoint telemetry, security teams end up bringing in multiple point solutions and threat intelligence feeds to figure out what is happening in their environment.

On top of it, they need to invest their budget and time in integrating these solutions and correlating data for actionable insights. With Qualys EDR, security teams can continuously collate asset telemetry such as process, files and hashes to detect malicious activities and correlate with natively integrated threat intel for prioritization score-based response actions.

Instead of reactively taking care of malicious events one endpoint at a time, security teams can easily pivot to inspect other endpoints across the hybrid infrastructure for exploitable vulnerabilities, MITRE-based misconfigurations, end-of-life or unapproved software and systems that lack critical patches.

Additionally, through native workflows that provide exact recommendations, security and IT teams can patch or remediate the endpoints for the security findings. This is an improvement over previous methods which require handshaking of data from one tool to another via complex integrations and manual workflows.

For example, Qualys EDR can help security teams not only detect MITRE-based attacks and malicious connections due to RDP (remote desktop) exploitation but can also provide visibility across the infrastructure. This highlights endpoints that can connect to the exploited endpoint and have RDP vulnerabilities or a MITRE-mapped configuration failure such as LSASS. Multi-Vector EDR then lets the user patch vulnerabilities and automatically remediate misconfigurations.

Thus, Qualys’ EDR solution is designed to equip security teams with advanced detections based on multiple vectors and rapid response and prevention capabilities, minimizing human intervention, simplifying the entire security investigation and analyze processes for organizations of all sizes. Security practitioners can sign up for a free trial here.

What response strategies does Qualys Multi-Vector EDR use?

Qualys EDR with its multi-layered, highly scalable cloud platform, retains telemetry data for active and historical view and natively correlates it with multiple external threat intelligent feeds. This eliminates the need to rely on a single malware database and provides a prioritized risk-based threat view. This helps security teams hunt for the threats proactively and reactively with unified context of all security vectors, reducing alert fatigue and helping security teams concentrate on what is critical.

Qualys EDR provides comprehensive response capabilities that go beyond traditional EDR options, like killing process and network connections, quarantining files, and much more. In addition, it uniquely orchestrates responses such as preventing future attacks by correlating exploitable-to-malware vulnerabilities automatically, patching endpoints and software directly from the cloud and downloading patches from the vendor’s website, without going through the VPN bandwidth.


from Help Net Security https://ift.tt/2QB6s1a