Now that attackers can bypass preventative controls, we need to find and stop the attackers when they're already inside.
Read moreMicrosoft blocks web installation of its own App Installer files
February 7 2022It's a big deal when a vendor decides to block one of its own "features" for security reasons. Here's why we think it's a good idea.
Read moreLog4j: Getting From Stopgap Remedies to Long-Term Solutions
February 7 2022This pervasive vulnerability will require continued care and attention to fully remediate and detect permutations. Here are some ways to get started.
Read moreName That Edge Toon: Head of the Table
February 7 2022Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreFriday Squid Blogging: Are Squid from Another Planet?
February 4 2022An actually serious scientific journal has published a paper speculating that octopus and squid could be of extraterrestrial origin. News article. As usual, you can also use this squid post to...
Read moreThe 3 Most Common Causes of Data Breaches in 2021
February 4 2022Phishing, smishing, and business email compromise continue to do their dirty work.
Read moreExpert Insights: Training the Data Elephant in the AI Room
February 4 2022Be aware of the risk of inadvertent data exposure in machine learning systems.
Read moreIt was the best of blockchains, it was the worst of blockchains... as Charles Dickens might have said.
Read moreThe Antlion group, also known as Pirate Panda and Tropic Trooper, has shifted to targeting mainly Taiwan, using custom backdoors against financial organizations.
Read moreThe EARN IT Act Is Back
February 4 2022Senators have reintroduced the EARN IT Act, requiring social media companies (among others) to administer a massive surveillance operation on their users:
A group of lawmakers led by Sen....
Read more
Recent Comments