Remove inherent-threats
article thumbnail

Security Vulnerability of Switzerland’s E-Voting System

Schneier on Security

Like any internet voting system, it has inherent security vulnerabilities: if there are malicious insiders, they can corrupt the vote count; and if thousands of voters’ computers are hacked by malware, the malware can change votes as they are transmitted. He explains it all in his blog post.

Malware 303
article thumbnail

Offensive Cybersecurity: The Definitive Guide

Security Boulevard

When considering how to thwart threat actors and protect IT assets against cyber attacks, many organizations take an inherently defensive approach. Locking down systems and assets with protective tools and procedures like firewalls, employee training, and incident response plans makes sense.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Think about Threat Detection in the Cloud

Anton on Security

This is written jointly with Tim Peacock and will eventually appear on the GCP blog. In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing. To start, let’s remind our audience what we mean by threat detection and detection and response.

article thumbnail

Guarding the Gates: The Intricacies of Detection Engineering and Threat Hunting

Security Boulevard

In the ever-evolving landscape of cybersecurity, two disciplines stand out: Detection Engineering and Threat Hunting. This article aims to illuminate the distinctive attributes of each discipline while addressing their inherent interplay.

article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threat detection. Impactful analysis A decoupled, purpose-built threat detection platform can work across distributed data lake architectures.

article thumbnail

Tax Season Alert: Common scams and cracked software

Webroot

Our threat analysts are constantly monitor the ebb and flow of various threats. This post aims to shed light on the dangers of using cracked software, share best practices for a secure tax season, and highlight our latest intelligence on the surge in cracked tax software threats. This especially means tax return forms.

Scams 90
article thumbnail

More SRE Lessons for SOC: Simplicity Helps Security

Anton on Security

The first point they make is a reminder of what makes it all exciting: “Software systems are inherently dynamic and unstable.” Phil’s 8 megatrends blog reminds us about this by calling one of his cloud megatrends “Simplicity: Cloud as an abstraction machine.” For us in security, another (tricky) dimension gets added: the threat.