Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Security
Lesley Carhart
hacks4pancakes
A really good interview question to scope out how mature an infosec person’s understanding of corporate security programs is this:“How to you measure the success of a phishing test security
Read more
Tinker
TinkerSec
Security companies share the same threat scenario as every single one of their clients.Those threat scenarios stack.This makes security companies a primary lynchpin target for anyone that would want to
Read more
galgitron (don't ask for predictions)
galgitron
Looks like scenario 2 is playing out, which is not a big deal. Shame on you SEC for dragging your ass for so many years. All Ripple ever did was
Read more
Monica Hakimi
MonicaHakimi
I was reminded today—because of a great lunchtime talk by @ShirinSinnar —of an old seed of an idea: Imagine if we thought about security threats less in terms of national
Read more
The Rational Walk
rationalwalk
If you want intellectual freedom, you need financial freedom because the world has always punished people in the short-run who dare to go against authority.This doesn't have to mean great
Read more
Negar Mortazavi
NegarMortazavi
IRGC officials now say the assassination of Mohsen Fakhrizadeh was done remotely with help of artificial intelligence. There were no attackers on the scene and a machine gun controlled via
Read more
Laffy
GottaLaff
Trump National Security Officials Horrified by His Election Lieshttps://www.thedailybeast.com/trump-national-security-officials-horrified-by-his-election-lies 2/ One senior official said they are “clear-eyed” about that possibility. “
Read more
Sheena Greitens
SheenaGreitens
This update on the SCO reflects how international orgs are now reflecting/incorporating China's revised threat perceptions/approach. A few thoughts. 1/n http://paper.people.com.cn/rmrb/html/2020-11/12/nw.D110000renmrb_20201112_3-03.htm
Read more
Mary Carlisle Wiley
marycwiley
Despite our desperate pursuit, security cannot and will not be found in paying off our mortgage, a clean bill of health, a certain level of status or influence, or the
Read more
Lukhanyo Vangqa
LukhanyoV
Mara guys you are corrupt maahn yoh.Transnet gave a R95 Million contract to General Nyanda Security, at the end of 2 years Transnet discovered that GNS had no employees and
Read more
galgitron (don't ask for predictions)
galgitron
The entire company Ripple was built around the idea of building value into XRP. In fact they've been promoting ILP as the level playing field they desire, but ILP would
Read more
Robert M. Lee
RobertMLee
Good example of echo chambers: I think I’m decently well known in infosec and ICS security. When I go visit folks working at the plants, get out to the field
Read more
The Walrus
thewalrus
Thousands of migrants cross the southern US border every month. Since 2017, a new eye-scanning system has been used to verify their identities. But how regulated are these biometric technologies?
Read more
Kim Zetter
KimZetter
Former security technician for home security company ADT admitted he secretly accessed customers' home security cameras more than 9,600 times over 4+ yrs, particularly in homes of attractive women to
Read more
David McBride
MurdochCadell
Distopian News:The man appointed by the Govt to 'fix' the SAS, David Irvine, is the same man who ordered agents to bug the East Timor Cabinet Rooms for Woodside's benefit.
Read more
Armon Dadgar
armon
Given the recent breaches, I think we will see a surge of interest in zero trust networking and moving beyond perimeter based security. The perimeter model has always been flawed
Read more
‹
1
2
3
4
5
6
7
8
...
625
626
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree