article thumbnail

The Presenting Vendor Paradox

Daniel Miessler

This presenter is just talking their own book! Many conference schedules, however, are full of talks from people who work at vendors. Conversely, people in the crowd at these conferences often have two complaints about the content. There isn’t enough good content, or. They sell service!

Mobile 353
article thumbnail

The Present and Future of TV Surveillance

Schneier on Security

Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

The Last Watchdog

Even in the cloud era, Microsoft Exchange Server remains a staple business communications tool across the globe. Related: The need for robust data recovery policies. One critical issue faced by organizations that rely on Exchange Server is the risk of a corrupt Exchange Server database cropping up.

Risk 264
article thumbnail

Engaging Executives: How to Present Cybersecurity in a Way That Resonates

Tech Republic Security

Getting buy-in can be difficult. Safe-U founder and CEO Jorge Litvin explains how to create a common language between the CISO and the rest of the C-suite.

CISO 177
article thumbnail

Hacking Scientific Citations

Schneier on Security

References in a scientific publication allow authors to justify methodological choices or present the results of past studies, highlighting the iterative and collaborative nature of science. Some legitimate references were also lost, meaning they were not present in the metadata.

Hacking 354
article thumbnail

AI Voice Scam

Schneier on Security

Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money intended for her.

Scams 327
article thumbnail

How the FBI Gets Location Information

Schneier on Security

Vice has a detailed article about how the FBI gets data from cell phone providers like AT&T, T-Mobile, and Verizon, based on a leaked (I think) 2019 139-page presentation.

Mobile 327