article thumbnail

Top Open Source Security Tools

eSecurity Planet

This has given rise to a large number of open source security tools. However, the tools themselves vary considerably in scope, sophistication, and function. The editors of eSecurity Planet find the following 20 open source security tools to be particularly useful. The Best Open Source Security Tools. WhiteSource.

Security 132
article thumbnail

Learning from our Past: Celebrating Black History Month with Lancaster University Library

CILIP

Learning from our Past: Celebrating Black History Month with Lancaster University Library Slavery Banner in Lancaster Universit Library (to Sunita Abraham) Lancaster University Library takes the lead in decolonisation to reach staff and students of the university, with a diverse range of engaging, and enriching activites, initiatives, and projects.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Are Now Exploiting Windows Event Logs

eSecurity Planet

Kaspersky researchers discovered that the attackers used various tools, including custom and commercial solutions like Cobalt Strike and a new toolset used by the hackers. Also read: How Cobalt Strike Became a Favorite Tool of Hackers. The campaign is dubbed “SilentBreak” for now, after the name of the toolset used by the hackers.

article thumbnail

RSAC insights: SolarWinds hack illustrates why software builds need scrutiny — at deployment

The Last Watchdog

One thing I did not realize about the SolarWinds hack is precisely how the attackers fooled more than 18,000 organizations into accepting an infected update of the widely-used Orion network management tool. It’s encouraging to see convergences of new tools and existing data stores. Golden image’ validation. This is how it should work.

article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

Yet today as much as 73 percent of all the data stored or moving across the network of a typical enterprise goes untouched by any analytics tools. Security information and event management systems (SIEMs) came along about 15 years ago as a tool security analysts could use to sift data logs for suspicious traffic.

Big data 118
article thumbnail

Customer service trends winning organizations need to follow

IBM Big Data Hub

The move toward self-service Organizations have built out their content libraries and knowledge bases, leading to more customers preferring self-service options to communicating with a support agent. Organizations must dedicate the appropriate resources to each channel as dictated by their customers’ preferences.

article thumbnail

Starting small but dreaming big: A beginner’s journey to web archiving

Archive-It

by Yoo Young Lee, Head, Information Technology, University of Ottawa Library. My journey to web archiving started suddenly, with an invitation to preserve the web content of the National Aboriginal Health Organization (NAHO) in 2017, when I had just joined the University of Ottawa Library as a Web and Digital Initiatives librarian.