Remove category space-exploration
article thumbnail

Reflective Practice and Threat Modeling (Threat Model Thursday)

Adam Shostack

If you’re reading this blog, you may have seen that some people are nearly mad about threat modeling. They have become too skillful at techniques of selective inattention, junk categories, and situational control, techniques which they use to preserve the constancy of their knowledge-in-practice.

article thumbnail

The dreaded Statement of Applicability

Notice Bored

b) and c)) and justification for inclusions, whether they are implemented or not, and the justification for exclusions of controls from Annex A; Point d) is the only reference to the S tatement o f A pplicability in ISO/IEC 27001 :2013 - a very succinct specification for such an important document, hence the reason for this blog piece.

Risk 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Around 2014 Chenxi authored a blog , which was very important for the industry in my opinion. So my friend was a Zenobia, who co authored the blog with me, s he and I walked around on the show floor. WANG : And I think if you read that blog today, you can feel the words that we used, we didn't really feel very personal.

InfoSec 40
article thumbnail

Brave Search wants to replace Google’s biased search results with yours

Malwarebytes

While Google enjoys a 92% market share , Brave has yet to break out of the search engine ranking’s miniscule “other” category. According to Brave’s blog , 92 percent of queries users receive are directly from Brave’s search index. Brave’s blog.

article thumbnail

Common Terminology in Adversarial Machine Learning

NetSpi Executives

Artificial Intelligence (AI) and Machine Learning (ML) have vast applications in the cyber space. With its quick adoption and limitless possibilities, the industry is in need of authorities who can provide expertise and perspective to help guide other professionals in their exploration of Large Language Models (LLMs).

article thumbnail

Administrator’s Guide, Part 2: Passwords Are Safer Than Biometrics, PINs Are Just Passwords, and Other Tall Tales

Duo's Security Blog

Part of our Administrator's Guide to Passwordless blog series See the video at the blog post. Switching to local evaluation of a user’s identity eliminates several entire categories of attacks that impact organizations and individuals today. Even weak local authentication stops most remote attacks cold.

article thumbnail

Top MDR Services for 2021

eSecurity Planet

Secureworks is owned by Dell Technologies, so it has a presence in the technology space to offer some extra credibility. LMNTRIX GRID is a SaaS XDR tool that offers automated threat hunting, detection, prevention, investigation, validation and forensic exploration on-demand. Focus on collaboration. LMNTRIX Active Defense.