article thumbnail

Using Cloud Securely?—?The Config Doom Question

Anton on Security

years ago, and stayed “top of the charts” for all this time (public cloud computing was born, depending on who you ask, in 2006–2008). Similarly, to compromise a modern mobile device, you probably would use social engineering or an exploit, not a configuration weakness. Thus, this explanation is not “the Answer.”

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S. Navy War College and the Pentagon in 2006-2007 • Operation Aurora hacks of Adobe, Juniper Networks, Northrop Grumman, Dow Chemical and dozens of other marquee U.S. So the threat landscape just keeps expanding.

IoT 171
article thumbnail

Using Cloud Securely?—?The Config Doom Question

Security Boulevard

years ago, and stayed “top of the charts” for all this time (public cloud computing was born, depending on who you ask, in 2006–2008). Similarly, to compromise a modern mobile device, you probably would use social engineering or an exploit, not a configuration weakness. Thus, this explanation is not “the Answer.”