Month: October 2019
An unsung cybersecurity hero
Here is some excellent reporting from ProPublica about an unsung cybersecurity hero. Michael Gillespie has helped thousands of people recover their files after they were…
US DoJ guidance on responding to and reporting cyber incidents
When thinking about how to respond to cyber security incidents, you need to think about how your organization will engage with law enforcement – and…
OWASP API Top 10 Security List
If your organization is developing software, chances are that your developers are building application program interfaces (APIs) to allow interoperability between your code and code…
Insider threat reporting by the numbers
I don’t normally take security advice from goats, but I think I need to make an exception for Red Goats. A recent report on insider…
Great resource for configuring TLS
OK, let’s admit it – issues around cryptography are the most complex and confusing part of information security. Aside from all that math, there are…
How authentication methods stack up
Here’s a nice resource from iDaptive’s blog on the relative merits of various common types of authentication technologies – interesting quick read.
Something about (Japanese) foxes and hen houses
Not strictly a security story, but interesting and alarming… Japanese authorities have decided that: It is permissible to make contributions to politicians using cryptocurrencies like…
Attack on encrypted PDFs exfiltrates clear text data
Here’s a quite clever hack… German security researchers have found a way to exfiltrate the contents of encrypted PDF files without breaking their encryption. Because…
NIST & Microsoft partner for patching pointers
The US Government’s National Institute of Standards and Technology and 8,000,000 pound gorilla Microsoft are working together to provide industry with definitive guidance on keeping…
Is Business Email Compromise a “cyber attack?”
Just what constitutes a cyber attack? That’s the question facing a court in a case brought against insurer AIG. One of the firm’s clients was…