5 links
tagged with all of: security + management
Click any tag below to further narrow down your results
Links
Santa is a macOS binary and file access authorization system designed to monitor execution and file access, allowing users to manage binary permissions through a local database and various configuration options. It operates in MONITOR or LOCKDOWN modes, supports code signing and path-based rules, and can synchronize settings with remote servers. Santa aims to enhance security by preventing malware execution while integrating into existing defense strategies.
The article outlines a three-part framework for security managers to guide their teams in selecting impactful projects. It emphasizes aligning work with business goals, individual interests, and personal growth to maximize productivity and engagement. By considering these criteria, managers can better prioritize tasks and foster a motivated workforce.
Open source security governance remains a significant challenge for organizations, as they struggle to effectively manage vulnerabilities in widely used components. The article emphasizes the importance of understanding the systemic risks associated with these components and advocates for a proactive governance approach that includes standardized dependency management, defined ownership, and continuous capability-building. Ultimately, it highlights that successful governance is an ongoing operational discipline rather than a one-off task.
The article discusses the growing concerns and chaos surrounding the management of SSL certificates, emphasizing the critical role they play in web security and the potential risks associated with improper handling. It highlights recent incidents that have led to widespread panic and the need for improved standards and practices in certificate management.
Static SSH keys pose significant security and management challenges as organizations scale, leading to access sprawl and audit difficulties. Transitioning to SSH certificates offers a scalable, secure, and auditable solution, enabling better control over access and reducing the risks associated with long-lived keys.