Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Security Lessons from My Game Closet
Newest First  |  Oldest First  |  Threaded View
PaulChau
50%
50%
PaulChau,
User Rank: Strategist
4/12/2019 | 2:17:44 AM
Keep things separate
I would not have thought so deeply into simple games like this man. I mean it's supposed to be for enjoyment and the competitive edge on it is of course a big part of the game experience, but I think that we need to be objective in segregating what and how each things works in the end..
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
3/25/2019 | 8:53:47 AM
Good points all
But you missed THE GAME of them all - Chess of course.  Looking 5 moves ahead is always hard and a logic challenge.  Not all are good at it and I have learned only to play with humans.  IF you play online, it works with humans but NOT with a computer.  THEY can out-think anything and that works for AI intelligence too.  Computers can analyze 5 steps or more in advance and quickly too while we humans ponder and think.  While good, we also make mistakes.   (I made a dandy one this morning on Monday to start the day off with a horror).   Second, you play to block in the power players or avoid the QUEEN who can kill everything at will.   (Power of women, thank you!)   Third, the King (read that C-Suite) can do almost nothing save move 1 square at a time.  (Also Board of directors).    Now onward to ZORK and DOOM!!!

On DOOM- at a MicroAge dealership we often had children playing that and good life lesson - RUN AWAY FROM THE MONSTER.  And use the BFG9000 to solve all problems.  


COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8603
PUBLISHED: 2020-05-27
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or ...
CVE-2020-8604
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations.
CVE-2020-8605
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.
CVE-2020-8606
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
CVE-2020-11075
PUBLISHED: 2020-05-27
In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a...