Quantcast
Channel: Insights – ITsecurity
Browsing all 117 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Still Pumping and Dumping

Pump and Dump spam campaign still piling on the improbabilities. The post Still Pumping and Dumping appeared first on ITsecurity.

View Article


Image may be NSFW.
Clik here to view.

Did democracy win with Macron? Doubtful

My first thoughts on Macron’s victory were that democracy had prevailed. But second thoughts made me wonder. We’re too accustomed to thinking of democracy in old-fashioned Left (socialist) and Right...

View Article


Image may be NSFW.
Clik here to view.

WannaCryptor: XP, Win8, WinServer 2003 patches

Even XP, Windows 8, and Windows Server 2003 systems can now be patched against the vulnerability exploited by WannaCrypt. Patching is highly recommended!The post WannaCryptor: XP, Win8, WinServer 2003...

View Article

Image may be NSFW.
Clik here to view.

WannaCryptor Afterthoughts…

…Not that we’re exactly in the post-WannaCryptor era yet. But forgive me if you’ve heard enough of the saga of the ransomware ESET calls Win32/Filecoder.WannaCryptor.D (after just a few days, I...

View Article

Image may be NSFW.
Clik here to view.

May Sketch: Reactions to Macron’s Victory

World Leaders’ Reactions to Macron’s Presidential Victory As reported by Yahoo Share This:The post May Sketch: Reactions to Macron’s Victory appeared first on ITsecurity.

View Article


Image may be NSFW.
Clik here to view.

May must be out in June: our last chance

Let’s not beat about the bush — Britain was tricked into voting for Brexit by an establishment determined to break Brussels’ interference in its increasingly hard-line and authoritarian policies....

View Article

Image may be NSFW.
Clik here to view.

My June Vote

I must repeat what I said before the last general election in the UK: I shall not vote. I dismiss as absurd the thoughtless claims that I have a duty to vote. I do not. I have a duty to follow my...

View Article

The CISO and the thin ice syndrome

FierceHealthIT magazine recently ran an article that commented, Almost half of C-level executives throughout all industries lack confidence in their chief information security officer (CISO), often...

View Article


Responding to Incidents and Preventing Crises

The gradual realization that we cannot keep hackers out of our networks has led to the evolution of a new security concept: incident response. This states that equal emphasis should be placed on the...

View Article


Professionalization: should infoSec professionalize?

In the context of this discussion, ‘professionalization’ is the creation of a governing body for cyber security practitioners, much like the American Medical Association (AMA) was created to oversee...

View Article

The Juniper backdoor and its implications

In December 2015 Juniper disclosed that it had found two backdoors in its firewalls – one of which allows encrypted traffic passing through to be decrypted. Since then there has been considerable...

View Article

What do the simple folk do for security?

I don’t mean to offend anybody with that title: it’s just a joke on the song from “Camelot.” But it does raise an issue. I’ve never been an uber geek. It’s been decades since I was a network maven. But...

View Article

Quantum computing and security management

Having looked at the basics of quantum computing, and the fundamental problems they can address, let’s turn to applying some of that to security itself, starting with security management. In security,...

View Article


Cryptography and quantum computing

Yes, I know I complained about it at the beginning, and I’ve dealt with it elsewhere, but I suppose I really have to address it. (There actually are a number of issues about cryptography and quantum...

View Article

Physical security and quantum computing

There is probably not a great deal that quantum computing can do to benefit physical security. As previously noted, biometrics may be improved, and these are being increasingly used for physical access...

View Article


Business Continuity Planning and quantum computing

I must admit that this topic is one that really gets me excited. Yes, other aspects of security can benefit from quantum computing, and the job can be eased or made more cost-effective. But in...

View Article

Integrity

Regardless of any personal political preference, I have found recent political discourse, particularly in the United States, profoundly disturbing on a professional level. I am currently a security...

View Article

Browsing all 117 articles
Browse latest View live