Remove Accountability Remove InfoSec Remove Risk
article thumbnail

Hacking Grindr Accounts with Copy and Paste

Troy Hunt

Another demonstration of how valuable Grindr data is came last year when the US gov deemed that Chinese ownership of the service constituted a national security risk. The vulnerability allow an attacker to hijack any account. On a surface of it, things looked bad: complete account takeover with a very trivial attack.

article thumbnail

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

The Last Watchdog

Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity. You can do so by submitting an email address or log in with your LinkedIn account. I’m honored to be included. It’s easy to participate on Peerlyst.

InfoSec 37
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Accounting is repeatable. The arcane.

InfoSec 180
article thumbnail

Account Takeover Risks of Small Businesses: How to Avoid Them

CTOVision Cybersecurity

Read Ben Hartwig explain how small and medium businesses can avoid account takeover risks on Infosec Magazine: Account takeover seeks to infiltrate an existing account and use them for the […].

article thumbnail

CISA Order Highlights Persistent Risk at Network Edge

Krebs on Security

Mandiant said the attackers will continue to change their tactics and malware, “especially as network defenders continue to take action against this adversary and their activity is further exposed by the infosec community.”

Risk 270
article thumbnail

Navigating the SEC’s Cybersecurity Disclosure Rules: One Year On

Security Boulevard

These rules , which mandate that all public companies disclose material cybersecurity incidents within four business days and detail their risk management strategies, highlight that cybersecurity is a board-level risk management concern. This post explores the impact of these regulations after one year.

article thumbnail

Professional services infosec policy template

Notice Bored

Professional services engagements, and hence the associated information risks, are so diverse that it made no sense to specify particular infosec controls, except a few examples. This is another shining example of the value of the 'information ownership' concept.

InfoSec 66