Recently, the tech press is full of stories about “a new ransomware strain” called GermanWiper, that has hit German businesses hard in the last week.

Rather like a typical ransomware attack vector, GermanWiper, arrives in your inbox in the form of an email.

Worse yet, it’s not ransomware. Ransomware at least provides a slim glimer of hope of getting your data back.

GermanWiper, rather like a typical ransomware attack, arrives in your inbox in the form of an email. In this case samples have been seen purporting to be a job application from a person called Lena Kretschmer.

Sarah Young joins Scott Hanselman to discuss Azure Sentinel, which is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response.

The worlds of CyberSecurity and AI are colliding. That’s the good news. The bad news is that the world of Cybersecurity and AI are colliding. Bad things could happen when bad actors get their hands on ML.

Artificial intelligence won’t revolutionize anything if hackers can mess with it. That’s the warning from Dawn Song , a professor at UC Berkeley who specializes in studying the security risks involved with AI and machine learning. Speaking at EmTech Digital, an event in San Francisco produced by […]

NB: this article is behind a registration wall. Usually, I avoid posting content from such sites, but this time I made an exception since the content is relevant and worth the hassle.

Here’s an enlightening look at the state of applying AI to security applications.

Top 5 barriers to AI security adoption

From this article in TechRepublic:

Artificial intelligence (AI) holds a great deal of promise for helpingcybersecurity professionals deal with more sophisticated and dangerous threats. But the technology faces several key obstacles before it is widely adopted in this field, according to a Tuesday survey conducted by SANS Institute and sponsored by Cylance. Among […]

Armon Dadgar (@armon), HashiCorp CTO and co-founder, and Aaron Schlesinger (@arschles) talk about how and why HashiCorp Vault is a security and open source product: two things traditionally considered at odds. Learn how to avoid secret sprawl and protect your apps’ data, ways for contributors and maintainers to enhance the security of any project, and why you should trust no one (including yourself).

Learn More

Create a Free Azure Account

HashiCorp Vault on Azure

Using HashiCorp Vault with Azure Kubernetes Service

Learn more about HashiCorp Vault

Check out HashiCorp Learn 

Read HashiCorp Blog

Learn more about secret sprawl

As the adoption of Kubernetes grows, secret management tools must integrate well with Kubernetes so that the sensitive data can be protected in the containerized world. On this episode, Yoko Hakuna demonstrates the HashiCorp Vault’s Kubernetes auth method for identifying the validity of containers requesting access to the secrets.