Upcoming Events

HLNCC supports the fight against cancer!

That CIA exploit list in full: The good, the bad, and the very ugly
We went through 8,000 documents so you don't have to...Read more

With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?
WikiLeaks lays out the capabilities of the agency’s global covert hacking program....Read more

How to Bury a Major Breach Notification
“Supply chain attacks,” provide one compromise vector to multiple targets....Read more

Top Firewall for Differently Populated Enterprises
No matter what the size of the company is, small or widely spread, there are some effective firewalls that can be used...Read more

User rats out IT team for playing games at work, gets them all fired
Data loss caused by the team's frag-happy habits didn't help their cause...Read more

AWS Outage that Broke the Internet Caused by Mistyped Command
The engineer that made the expensive mistake meant to execute a command intended to remove only a small number of server...Read more

Amazon's AWS S3 cloud storage evaporates: Top websites, Docker stung
'Increased error rates' is the new 'outage', according to Bezos' bit-barn bods...Read more

LinkedIn Vacates Lots of Space at Equinix Data Centers
LinkedIn revamped its datacenter strategy, consolidating its retail colo footprint into few large wholesale facilities....Read more

It's Time to Abandon the Castle
The common thread among all cyber-attacks is that they occur over a network....Read more

ONF Aims To Turn Open Source Hardware & Software Into Legos
This non-profit advocate of open source networking has announced an initiative to re-aggregate many of the pieces...Read more

Cisco Shrinks in Switching, Routing and DC
Cisco is shrinking at a reasonable rate and management has the decline under control....Read more

The impact on network security through encrypted protocols – TLS 1.3
What advantages does TLS 1.3 bring and what is the impact on network security?...Read more

3 7 13 0 0 31 Cyber Threats Facing APAC – Applications
Along with all of the good comes the bad – the raised risk and exposure to security threats....Read more

Qualys brings web application security automation to a new level
At RSA Conference 2017, Qualys announced new functionality in its web application security offerings...Read more