article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Org Structure. Technology. Regulation.

InfoSec 180
article thumbnail

Inside the DemandScience by Pure Incubation Data Breach

Troy Hunt

For example, mine was just one of many tens of thousands of Pfizer email addresses, and that sort of thing is going to raise the ire of some folks in corporate infosec capacities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside the Massive Alleged AT&T Data Breach

Troy Hunt

The linked article talks about the author verifying the data with various people he knows, as well as other well-known infosec identities verifying its accuracy. Per the linked story, social security numbers and dates of birth exist on most rows of the data in encrypted format, but two supplemental files expose these in plain text.

article thumbnail

Let’s Encrypt to revoke “mis-issued” certificates

Malwarebytes

If you use a Let’s Encrypt SSL/TLS certificate, you may wish to check your account over the coming days. The onset of mass free HTTPS certificates has, interestingly, meant a few tweaks being applied to infosec advice realms. What’s happened with Let’s Encrypt? What’s the deal with free certificates?

article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

At the same time, we also have changes at every layer of the protocol stack and this is driven by an increased push for encryption—not just encryption, strong encryption.". We're responsible for the CIS benchmarks and the CIS controls.

InfoSec 97
article thumbnail

USENIX Enigma 2023 – Kenn White, MongoDB – ‘The Edge Of Developed Practice In Searching Encrypted Data’

Security Boulevard

Permalink The post USENIX Enigma 2023 – Kenn White, MongoDB – ‘The Edge Of Developed Practice In Searching Encrypted Data’ appeared first on Security Boulevard. Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel.

article thumbnail

The Clock To Q-Day Is Ticking: InfoSec Global and Thales Provide Collaborative Path to Quantum Readiness

Thales Cloud Protection & Licensing

To counter HNDL, migrating critical systems to Post-Quantum Cryptography (PQC) provides encryption and authentication methods resistant to an attack from a cryptographically relevant quantum computer (CRQC). Encryption Thales | Cloud Protection & Licensing Solutions More About This Author > Schema In the U.S.,

InfoSec 71