News
Commentary
Quick Hits
Quick Hits
Commentary
News
News
News
Quick Hits
Commentary
Quick Hits
News
Commentary
Commentary
Quick Hits
Quick Hits
News
Commentary
When you said you were hiring a "cybersecurity watchdog", I had a different mental picture.
In reply to: caption
He's come pretty far from only sniffing the rear ends of packets.
In reply to: Re: Caption
And reading is hard for computer and easy for human.The problem of signature-based detections is just so many many logs and alerts.But ultimately, machine learning will be trend.
In reply to: String matching and reading are pretty similar.
BlackHat hackers getting more sophisticated by the day: we make it so easy with end point solutions that look like a dog's breakfast.
In reply to: Name that Toon: It's A Dog's Life
I keep telling him that Fidonet isn't a thing any more, but he just won't listen...
In reply to: Caption
Yes, there is no surprise in it. They may simply bypassed the lock screen in iOS. Latest iOS update migh fix this issue
In reply to: Re: iphone
Thanks, MESBernard. You make a good point about skills/resources. Our story was based on Tenable's survey, which I don't think drilled down into what exactly the investment costs entailed.
In reply to: Re: NIST Cybersecurity Framework Adoption Hampered By Costs, Survey Finds
The iphone's lock screen has consistently been insecure even with any iOS updates. There is no doubt in my mind that it was simply bypassed.
In reply to: iphone
There is no dearth of advice about protection from ransomware and it always mentions (glibly) the importance of making backups and keeping them offline. But the data may be crypto-locked before it gets backed up. The key...
In reply to: Backups for ransomware
Reminds me of when Google engineer Tavis Ormandy released a zero-day Microsoft vulnerability before Microsoft had the opportunity to patch it -- and the stark contrast that action and Google's nonchalant response to...
In reply to: So much for cooperation in security
Any organization that uses (or, for that matter, should be using) PCI-DSS should strongly consider implementing this -- or, if not, specifically address in their written policies why they are declining to do so in favor...
In reply to: Can go hand-in-hand with PCI-DSS
Latest Comment: This comment is waiting for review by our moderators.
Understanding & Managing the Mobile Security ThreatMobile devices are increasing IT security risk. Is your enterprise ready?
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?