Researchers from Cornell found Google’s Map URLs contain all sorts of personal data. Microsoft’s shortened URLs do, too. The short answer: take care to secure simple services.
Watch more videos on my YouTube channel.
Researchers from Cornell found Google’s Map URLs contain all sorts of personal data. Microsoft’s shortened URLs do, too. The short answer: take care to secure simple services.
Watch more videos on my YouTube channel.
Application and database decisions that impact performance when using data and database encryption. It’s easy. (It’s not easy.)
Watch more videos on my YouTube channel.
So, what’s the best way to do enterprise disk encryption? Software like Bitlocker or PKware? Hardware with the Dell, EMC, or whomever? A combination using HP Atalla? Well. It depends.
Watch more videos on my YouTube channel.
Responding to the news cycle by tying hype back to our IT security program. Take, for example, BadLock. Are we prepared?
Watch more videos on my YouTube channel.
Inserting wormable malware in packages in general and, specifically, Sam Saccone’s warnings about the Node.js Package Manager (npm).
Watch more videos on my YouTube channel.
The ciso’s journey for assessments: no testing; testing but no remediation; testing with remediation projects; lots of testing and lots of projects; centralized remediation program for all findings. Also, some GPS directions to keep it real.
Watch more videos on my YouTube channel.
University of Illinois researchers drop some 297 USB drives on campus. 48% of the drives get opened and browsed. The scare is that these could have been malicious drives with malware. So, what should we do about it? Spoiler alert: maybe nothing.
Watch more videos on my YouTube channel.
We can do months long cyber war games. We can do weeks of incident response exercises. Or, hey, we can do a couple days. Today, we talk about how to choose which is right, and how to know it’s time to shift up or shift down.
Watch more videos on my YouTube channel.
BYOD? Meh. Shadow IT? Pfft. Family and friends borrowing tech that accesses our corporate systems? Wait. Now that is scary.
Watch more videos on my YouTube channel.
Four things that make KeRanger unique: targeted a Mac, embedded in a signed app, delayed attack execution, and code for disrupting Time Capsule backups.
Watch more videos on my YouTube channel.