The ransomware attack proves that even the wealthiest cannot buy their immunity from threat actors.
Read moreThe Internet Reform Trilemma
April 14 2023An "open" Internet faces challenges from autocratic governance models. Policymakers should instead think about creating an Internet that's equitable, inclusive, and secure.
Read moreS3 Ep130: Open the garage bay doors, HAL [Audio + Text]
April 14 2023I'm sorry, Dave. I'm afraid I can't... errr, no, hang on a minute, I can do that easily! Worldwide! Right now!
Read moreTo report or not report? While more than half of all companies have suffered a data breach, 71% of IT professionals say they have been told to not report...
Read moreA novel credential harvester compromises SMTP services to steal data from a range of hosted services and providers, and can also launch SMS-based spam attacks against devices using US...
Read moreThere are plenty of AD objects and groups that should be considered tier zero in every environment, but some will vary among organizations.
Read moreBypassing a Theft Threat Model
April 13 2023Thieves cut through the wall of a coffee shop to get to an Apple store, bypassing the alarms in the process.
I wrote about this kind of thing in...
Read moreWith deps.dev API and Assured OSS, Google is addressing the common challenges software developers face in securing the software supply chain.
Read more
Recent Comments