Month: October 2019

An unsung cybersecurity hero

Here is some excellent reporting from ProPublica about an unsung cybersecurity hero. Michael Gillespie has helped thousands of people recover their files after they were…

Continue Reading

US DoJ guidance on responding to and reporting cyber incidents

When thinking about how to respond to cyber security incidents, you need to think about how your organization will engage with law enforcement – and…

Continue Reading

OWASP API Top 10 Security List

If your organization is developing software, chances are that your developers are building application program interfaces (APIs) to allow interoperability between your code and code…

Continue Reading

Insider threat reporting by the numbers

I don’t normally take security advice from goats, but I think I need to make an exception for Red Goats. A recent report on insider…

Continue Reading

Great resource for configuring TLS

OK, let’s admit it – issues around cryptography are the most complex and confusing part of information security. Aside from all that math, there are…

Continue Reading

How authentication methods stack up

Here’s a nice resource from iDaptive’s blog on the relative merits of various common types of authentication technologies – interesting quick read.

Continue Reading

Something about (Japanese) foxes and hen houses

Not strictly a security story, but interesting and alarming… Japanese authorities have decided that: It is permissible to make contributions to politicians using cryptocurrencies like…

Continue Reading

Attack on encrypted PDFs exfiltrates clear text data

Here’s a quite clever hack… German security researchers have found a way to exfiltrate the contents of encrypted PDF files without breaking their encryption. Because…

Continue Reading

NIST & Microsoft partner for patching pointers

The US Government’s National Institute of Standards and Technology and 8,000,000 pound gorilla Microsoft are working together to provide industry with definitive guidance on keeping…

Continue Reading

Is Business Email Compromise a “cyber attack?”

Just what constitutes a cyber attack? That’s the question facing a court in a case brought against insurer AIG. One of the firm’s clients was…

Continue Reading