Tag: security
-
Security-focused routers may help to mitigate IoT threats
Walking around the RSA show floor last week, it was clear that the Internet of Things, or IoT, is a hot topic in security. Indeed, the number of connected devices continues to grow and new IoT botnets continue to be discovered, with Saikin and Hajime being two of the most recent examples. It is important…
-
Security-focused routers may help to mitigate IoT threats
Walking around the RSA show floor last week, it was clear that the Internet of Things, or IoT, is a hot topic in security. Indeed, the number of connected devices continues to grow and new IoT botnets continue to be discovered, with Saikin and Hajime being two of the most recent examples. It is important…
-
Facebook helps you determine whether emails really came from its servers
There are many good reasons to criticize Facebook for its collecting of our personal data, but the company also deserves credit for being at the forefront when it comes to online security. The company has long had a generous bug bounty program , can send PGP-encrypted notifications, and has even set up a .onion version…
-
Facebook helps you determine whether emails really came from its servers
There are many good reasons to criticize Facebook for its collecting of our personal data, but the company also deserves credit for being at the forefront when it comes to online security. The company has long had a generous bug bounty program , can send PGP-encrypted notifications, and has even set up a .onion version…
-
VB2017 video: Consequences of bad security in health care
” You are probably asking yourselves what a nurse is doing at a cybersecurity conference. Trust me, my colleagues are even more surprised, because they truly believe that hospitals have the best security ever. ” Thus Jelena Milosevic , a nurse with a passion for IT security, began her VB2017 presentation , ‘Consequences of bad…
-
VB2017 video: Consequences of bad security in health care
” You are probably asking yourselves what a nurse is doing at a cybersecurity conference. Trust me, my colleagues are even more surprised, because they truly believe that hospitals have the best security ever. ” Thus Jelena Milosevic , a nurse with a passion for IT security, began her VB2017 presentation , ‘Consequences of bad…
-
Transparency is essential when monitoring your users’ activities
The inspection of HTTPS traffic is a sensitive issue among security experts. On the one hand, there are those who argue that this breaks the important end-to-end principle of secure connections, while others argue that it is essential if one wants to block malicious network traffic, which is increasingly using HTTPS. I tend to side…
-
Transparency is essential when monitoring your users’ activities
The inspection of HTTPS traffic is a sensitive issue among security experts. On the one hand, there are those who argue that this breaks the important end-to-end principle of secure connections, while others argue that it is essential if one wants to block malicious network traffic, which is increasingly using HTTPS. I tend to side…
-
Patching is important even when it only shows the maturity of your security process
Sometimes a Tweet says more than a 50-minute conference presentation: Bad TLS as an externally measurable metric for whether an organisation has a mature security process, sure. But it aint getting ya no shell. — Metlstorm (@Metlstorm) September 4, 2017 This Tweet by Adam Boileau (best known outside New Zealand as the co-host of the…
-
Patching is important even when it only shows the maturity of your security process
Sometimes a Tweet says more than a 50-minute conference presentation: Bad TLS as an externally measurable metric for whether an organisation has a mature security process, sure. But it aint getting ya no shell. — Metlstorm (@Metlstorm) September 4, 2017 This Tweet by Adam Boileau (best known outside New Zealand as the co-host of the…