This guide provides the reader with a basic introduction to key terms and concepts used in a PKI including Certificates, Keys and Authorities. It mentions the features and services used by the PKI and the techniques involved in public key cryptography.
Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised.
Discussions about security intelligence still focus primarily around conventional reactive SIEM. Security pros need to move from this reactive model to proactively using this security intelligence to protect their businesses.