Remove 2001 Remove Authentication Remove Security Remove Systems administration
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

Related: How ‘PAM’ improves authentication. But this also opens up a sprawling array of fresh security gaps that threat actors are proactively probing and exploiting. There’s a glut of innovative security solutions, to be sure, and no shortage of security frameworks designed to help companies mitigate cyber risks.

Security 201
article thumbnail

Weekly podcast: Memcached DDoS attacks, Equifax (once again) and Alexa

IT Governance

An Akamai blog explained that memcached is “meant to cache data and reduce strain on heavier data stores […] and is only intended to be used on systems that are not exposed to the Internet”. The protocol requires no authentication, so when it “is added to the ability to spoof IP addresses of UDP traffic, [it] can be easily abused”.