Is It That Time Again Already?
Graduations, weddings, and beach trips. These mark the transition from spring to summer. And, if you live along the Gulf Coast, hurricanes. Before the June page is even visible on our calendars, meteorological disturbances lurk in the increasingly warm waters of the Gulf of Mexico.
Not As Fast As You Might Think
In a recent Security Week article, Justin Fier holds forth on a topic that is at once both incredible and credible. The topic is data exfiltration, and the perspective the article casts makes it a worthy read. Most consumers and laypeople in the commercial streams of the Internet think data breaches occur with great haste,
Fridge With A Mind Of Its Own
Well not exactly. Let’s just say the refrigerator may not always be focused on keeping your lettuce crisp. In a recent Express post, Harvey Gavin reports that hackers could seize control of your Samsung refrigerator and use it to mine bitcoin. And it’s not just the fridge.
The Real Deal
In a recent television interview, FBI Director Chris Wray reflected on Russian hacking into the American power grid and other vital infrastructure. The breach occurred in early March, and Wray didn’t mince words, calling the invasion “the real deal.” First the elections and now the grid? Wait.
Monetizing Uncle Larry’s Politics
Facebook, and social media in general, opened the floodgates of torrential conversation. As has been said of the technology, “The good news is, everybody has a voice. The bad news is everybody has a voice.” For many, Facebook has been slipping into a realm of political rants separated only by friend requests from high school […]
The Dark Side Of Breach Victims
As a part of reconciling interests following a highly publicized breach, victim organizations often apologize with an offer to induce customers to remain or return to the fold. Retailers may reduce prices or offer subscription memberships, while banks may offer credit reporting or monitoring for a year or enhanced rates on accounts.
Stuxnet: The Gift That Keeps On Giving
Remember that time when the Iranian nuclear program was flummoxed by the speeding up or slowing down of their centrifuges? Though the actors have never been formally identified, the special sauce to that enterprise was Stuxnet, and the secret ingredient of that sauce was counterfeit cryptographic certificates from known companies that greased the skids for […]
This Is Only A Test
Imagine a scenario in which one of your employees — Madge in accounting, or Skip in sales, for instance — selects an incorrect option from a drop-down menu and opens your network and data to the world. Working with that set of menu options is part of his daily routine, but for some reason the […]
Got Your Head In The Clouds?
A recent cloud security report, as you might expect, had some good news and some bad. Somewhere in the middle is the news that’s just that: news. The cases you hear the most about, like the ransomware attacks, make up only about 2% of the overall picture, while web applications represent about 75% of the […]
The Most Interesting IT Guy In The World
You’ve seen him at conferences, sporting an ascot and a pocket protector and making it look good. He works the vendor pit like he owns the place, collecting cards and envy from everyone he meets, and connecting demand with supply in subtle but glamorous ways. He walks into a seminar like he was walking onto […]