❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Unlocking the Power of Amazon Security Lake for Proactive Security

Security is a central challenge in modern application development and maintenance, requiring not just traditional practices but also a deep understanding of application architecture and data flow. While organizations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence.

Light at the End of the Dark Web

By: BHIS
3 March 2025 at 11:00

Join us for this one-hour Black Hills Information Security webcast with Joseph - Security Analyst, as he shares with you what he's discovered and learned about the Dark Web, so you never ever ever have to go there for yourself.

The post Light at the End of the Dark Web appeared first on Black Hills Information Security, Inc..

Finding: Server Supports Weak Transport Layer Security (SSL/TLS)

By: BHIS
14 June 2018 at 09:32

David Fletcher// The following blog post is meant to expand upon the findings commonly identified in BHIS reports. Β The β€œServer Supports Weak Transport Layer Security (SSL/TLS)” is almost universal across […]

The post Finding: Server Supports Weak Transport Layer Security (SSL/TLS) appeared first on Black Hills Information Security, Inc..

Lawrence’s List 072916

By: BHIS
29 July 2016 at 13:25

Lawrence Hoffman // So, LastPass is one of my favorite applications, and it’s making me more nervous every day. I haven’t lost faith yet, though it was lots more convenient […]

The post Lawrence’s List 072916 appeared first on Black Hills Information Security, Inc..

❌
❌