Remove security-many-things-change-much-remains-same
article thumbnail

Can We Stop Pretending SMS Is Secure Now?

Krebs on Security

SMS text messages were already the weakest link securing just about anything online, mainly because there are tens of thousands of employees at mobile stores who can be tricked or bribed into swapping control over a mobile phone number to someone else. “It’s an industry-wide thing.

article thumbnail

GUEST ESSAY: A roadmap to achieve a better balance of network security and performance

The Last Watchdog

Here’s a frustrating reality about securing an enterprise network: the more closely you inspect network traffic, the more it deteriorates the user experience. Why do so many businesses struggle to balance network security and user experience? It adds up to a much larger potential attack surface. Navigating threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

You’re peering into a forbidden world: strange, confusing, and fascinating all at the same time. I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. The meeting presenters try to spice things up. Those were all things I want the NSA to be doing.

article thumbnail

RSA 2023: Not Under the GenAI Influence Yet!

Anton on Security

Security business is booming! It is very clear from observing the large booths of many vendors (including some that are doing well unexpectedly ) that “there is lots of money in cyberland.” One noticeable thing that stood out to us as we wandered the RSA show floor was the relative shortage of XDR. Is XDR finally over?

article thumbnail

Still Why No HTTPS?

Troy Hunt

and it gave people a way to see the largest websites not taking transport layer security seriously. We also broke the list down on a country-by-country basis and it quickly became a means of highlighting security gaps and serving as a "list of shame". com loads over HTTPS by default for me", do please start by reading that blog post.

Firewall 169
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Now for the big challenge - security. The "s" in IoT is for Security Ok, so the joke is a stupid oldie, but a hard truth lies within it: there have been some shocking instances of security lapses in IoT devices. Or are they just the same old risks we've always had with data stored on the internet? Let's dive into it.

IoT 358
article thumbnail

New Paper: “Autonomic Security Operations?—?10X Transformation of the Security Operations Center”

Anton on Security

New Paper: “Autonomic Security Operations?—?10X 10X Transformation of the Security Operations Center” It is with much excitement that we announce a new paper about transforming your security operations ; it is published under the Office of the CISO at Google Cloud. Will SOC remain at the center of anything?