Security companies share the same threat scenario as every single one of their clients.
Those threat scenarios stack.
This makes security companies a primary lynchpin target for anyone that would want to pivot into one of their clients.
Those threat scenarios stack.
This makes security companies a primary lynchpin target for anyone that would want to pivot into one of their clients.
Often security products are placed at the highest privilege, the highest access, and the broadest range possible.
This allows the product to secure everything in its aegis.
This also means that if you have security, you hack everything.
This allows the product to secure everything in its aegis.
This also means that if you have security, you hack everything.
Further, if you hack that which detects hacks, you can make your hacks undetectable.
Ah, the world we live in.
It’s a beautiful day, isn’t it?
It’s a beautiful day, isn’t it?
This is all human nature.
The core reasons why there is a need for security...
That we can’t possibly code or build securely. That folks want to get into things they aren’t allowed into...
...means that this sort of thing will always be around.
The core reasons why there is a need for security...
That we can’t possibly code or build securely. That folks want to get into things they aren’t allowed into...
...means that this sort of thing will always be around.
Those of us that are in information security will either have jobs for the rest of our lives...
...or be fired tomorrow when folks realize we can’t ever fully secure anything.
...or be fired tomorrow when folks realize we can’t ever fully secure anything.