Sat.Jan 13, 2018 - Fri.Jan 19, 2018

article thumbnail

Student Cracks Inca Knot Code

Schneier on Security

Interesting.

187
187
article thumbnail

Streamlining Data Breach Disclosures: A Step-by-Step Process

Troy Hunt

I don't know how many data breaches I'm sitting on that I'm yet to process. 100? 200? It's hard to tell because often I'm sent collections of multiple incidents in a single archive, often there's junk in there and often there's redundancy across those collections. All I really know is that there's hundreds of gigabytes spread across thousands of files.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it.

112
112
article thumbnail

Four Malicious Google Chrome Extensions Affect 500K Users

Dark Reading

ICEBRG Security Research team's finding highlights an often-overlooked threat.

88
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Security Breaches Don't Affect Stock Price

Schneier on Security

Interesting research: " Long-term market implications of data breaches, not ," by Russell Lange and Eric W. Burger. Abstract : This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies' stock, with a focus on the results relative to the performance of the firms' peer industries, as represented through selected indices rather than the market as a whole.

Marketing 348
article thumbnail

Weekly Update 70 (NDC London Edition)

Troy Hunt

It's NDC London! I'm pushing this week's update out a little later due to the different time zones and frankly, due to it being an absolutely non-stop week of events. I talk about those, about how I'm trying to tackle breach disclosures now and about some upcoming events. Next week is Norway and Denmark and I'll be coming to you a little later due to a totally jam-packed Friday, more from me then. iTunes podcast | Google Play Music podcast | RSS podcast.

118
118

More Trending

article thumbnail

Does Encryption Really Protect My Cloud Data?

Thales Cloud Protection & Licensing

There has always been a battle between business efficiency and security since the invention of shared compute and data resources. Enterprise risk managers continue to swing the pendulum between business risk and security risk, depending on new demands versus new threats. Today’s enterprises have experienced this pendulum shift as cloud has become more relevant.

article thumbnail

Fighting Ransomware

Schneier on Security

No More Ransom is a central repository of keys and applications for ransomware, so people can recover their data without paying. It's not complete, of course, but is pretty good against older strains of ransomware. The site is a joint effort by Europol, the Dutch police, Kaspersky, and McAfee.

article thumbnail

Where to Find Security Holes in Serverless Architecture

Dark Reading

Serverless architectures take away business responsibility for server management, but security should still be top of mind.

article thumbnail

How the False Hawaii Missile Warning Could Have Happened

WIRED Threat Level

And where was the federal government?

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Enterprise Technologies That Tame GDPR Compliance

eSecurity Planet

The IT and software solutions that help businesses meet the EU's tough new data privacy regulation.

article thumbnail

Article from a Former Chinese PLA General on Cyber Sovereignty

Schneier on Security

Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society, Vice President of China Institute for Innovation and Development Strategy, and the Chair of the Guanchao Cyber Forum. Against the background of globalization and the internet era, the emerging cyber sovereignty concept calls for breaking through the limitations of physical space and avoiding misunderstandings based on perceptions of

article thumbnail

Doh!!! The 10 Most Overlooked Security Tasks

Dark Reading

Here's a list of gotchas that often slip past overburdened security pros.

61
article thumbnail

Triton Malware Details Show the Dangers of Industrial System Sabotage

WIRED Threat Level

New details about Triton malware should put industrial systems and critical infrastructure on notice.

Malware 110
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Lenovo Patches Networking OS Vulnerability Dating Back to 2004

Threatpost

A bug in Lenovo’s Enterprise Networking Operating System could allow an attacker to launch an authentication bypass attack.

article thumbnail

Jim Risen Writes about Reporting Government Secrets

Schneier on Security

Jim Risen writes a long and interesting article about his battles with the US government and the New York Times to report government secrets.

article thumbnail

Accelerated Cloud Adoption Creates More Corporate Responsibility

Thales Cloud Protection & Licensing

I have been in the security space for many decades. Although security technologies and processes have vastly improved, it seems that we are losing the battle as more and more data breaches are reported in the news. The wide adoption of the cloud has added to the concern for most enterprise risk officers. Due to increasing risk, favoring business efficiency over security — especially when dealing with cloud services — is no longer an accepted approach.

article thumbnail

A Popular Crime-Predicting Algorithms Performed Worse Than Mechanical Turks in One Study

WIRED Threat Level

When researchers put a popular criminal justice algorithm up against a bunch of Mechanical Turks, they came out about even.

108
108
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Attackers Use Microsoft Office Vulnerabilities to Spread Zyklon Malware

Threatpost

Hackers are exploiting three Microsoft Office vulnerabilities to spread the Zyklon HTTP malware.

Malware 59
article thumbnail

Which CISO 'Tribe' Do You Belong To?

Dark Reading

New research categorizes CISOs into four distinct groups based on factors related to workforce, governance, and security controls.

CISO 59
article thumbnail

Flexera Corporate Software Inspector: Overview and Analysis

eSecurity Planet

We review Flexera Corporate Software Inspector, a patch management solution for Windows, Mac OS and Red Hat Linux.

article thumbnail

The 'Doublespeak' of Responsible Encryption

WIRED Threat Level

It's a new name for an old argument: that public agencies fighting crime and terrorism must have access to our private communications—for our own good.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Sprawling Mobile Espionage Campaign Targets Android Devices

Threatpost

A massive mobile espionage campaign has been collecting troves of sensitive personal information since 2012, according to a new report from the Electronic Frontier Foundation and security firm Lookout.

Mobile 52
article thumbnail

Threats from Russia, North Korea Loom as Geopolitics Spills into Cyber Realm

Dark Reading

Threat actors from both nations ramped up their activities sharply in 2017, Flashpoint says in a new threat intelligence report.

56
article thumbnail

Nine Top Patch Management Solutions

eSecurity Planet

Patch management might be the single most important security tool. We review 9 of the top patch management solutions.

54
article thumbnail

Meltdown, Spectre, Malicious Apps, and More of This Week's Security News

WIRED Threat Level

Meltdown, Spectre, malicious Android apps, and more of the week's top security news.

107
107
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Oracle Ships 237 Fixes in Latest Critical Patch Update

Threatpost

Enterprise applications from Oracle and others could be becoming juicier targets for attackers.

Hacking 52
article thumbnail

Mental Models & Security: Thinking Like a Hacker

Dark Reading

These seven approaches can change the way you tackle problems.

54
article thumbnail

Ivanti Patch: Patch Management Overview and Analysis

eSecurity Planet

We review Ivanti Patch, a range of patch management solutions for small companies through large enterprises.

49
article thumbnail

A New Way to Track Down Bugs Could Help Save IoT

WIRED Threat Level

New research advances techniques for finding and exploiting known vulnerabilities in IoT devices automatically.

IoT 104
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!