For years, information security has been saying that the user is the weakest link. I don’t know if they are the weakest link or not, but the connotations of saying that are completely wrong and are damaging the security posture of many organizations.
Category: Security
Introduction to dependencyCheck: an open source Software Composition Analysis (SCA) tool
depencencyCheck is an open source dependency security scanner. This kind of tools are also called SCA (Software Composition Analysis).
dependencyCheck identifies which dependencies (aka third party libraries) a software is using and indicates if any of them have known vulnerabilities.
How to reduce the risk of being infected and impacted by ransomware
In a previous job, I had the mission of protecting a huge Windows infrastructure from ransomware. I had the resources to investigate and implement the necessary security controls. This is what I learned.
Continue reading “How to reduce the risk of being infected and impacted by ransomware”