Photo by Janko Ferlič on Unsplash You just have to outrun the other guy. Unfortunately, there is no absolute for security. There are sufficient unknowns and changes in the world of cybersecurity such as to make a state of ‘completely safe’ impossible. The greatest security in the world is still vulnerable under certain conditions, however unlikely …
The SANS institute have produced a white paper report on Security Awareness. This is an area of particular interest for me as the human element in security is something that I have been paying particular attention to. The work that we have been doing over the past years with cybersec101.ca to facilitate community-led security …
I see a lot of our work as being the antidote to the poison of FUD (Fear, Uncertainty and Doubt). Oxford puts FUD in its place nicely by suffixing the definition with “,usually evoked intentionally in order to put a competitor at a disadvantage.” Superlative laden stories about the biggest, worst, most expensive, unstoppable, etc. hacking …
Power Projection in the Digital Age: The Only Winning Move is to Play General Darren W. McDew, USAF, is the Commander of U.S. Transportation Command (USTRANSCOM), the Command responsible for the transportation for the US Department of Defence. He provides an interesting insight into the importance of cybersecurity to the capabilities of the modern military. Information …
A recent podcast from risky business (www.risky.biz) had a very interesting interview with Stephen Morse, formerly the staff vice president of cybersecurity analytics at Anthem. You might remember that Anthem were the target of a state-sponsored attack back in 2015. The interview is well worth listening, particularly for those charged with security in a large …
What do would you do if you misplaced your credit card? You are pretty sure it is in your other jacket, locked in the office for the weekend but you aren’t absolutely certain. Would you call the bank and cancel it immediately? The option of cancelling a security token when it is potentially jeopardized …
“What I can say is there are many ways to surveil each other,” Ms. Conway told the paper. “You can surveil someone through their phones, certainly through their television sets — any number of ways.” Surveillance can even be carried out with “microwaves that turn into cameras,” she added. “We know this is a fact …
Short answer is bad, but for more reasons than first come to mind. Wikileaks recently released a vault of documents allegedly from the CIA relating to their cyber capabilities[1]. This is not the first time that Wikileaks has released fairly targeted documents against an agency in the United States[2][3][4][5]. Wikileaks founder Julian Assange has clear …
A grand jury Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo’s network and the contents of webmail accounts. The defendants are Dmitry Aleksandrovich Dokuchaev, 33, …
DARPA held their cyber grand challenge in Las Vegas last week. The challenge pitted 7 autonomous security systems against each other in a Capture The Flag Competition. The winning system then went on to compete in DEFcon’s regular CTF against human competition and did as well as was expected (dead last). The job of commentating 7 …