Remove sometimes-things-actually-do-work
article thumbnail

Me on COVID-19 Contact Tracing Apps

Schneier on Security

Does anybody think this will do something useful? This is just something governments want to do for the hell of it. To me, it's just techies doing techie things because they don't know what else to do.". I haven't blogged about this because I thought it was obvious. What should you do? No, you're not.

Media 364
article thumbnail

How to Make Threat Detection Better?

Anton on Security

How do we get the mainstream companies to improve their detection quality ? How do we get to more and better detections ? More curiously, how do we get to better detections that are also developed rapidly (to avoid the “good/fast/cheap? The fact that we do not have reliable data on attackers and attacker behavior.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

Q: When do you think the industry will understand what XDR entails? The “better EDR” crowd keeps taking past “integrated SIEM-like thing” crowd who both talk past “EDR+NDR” crowd. Q: How do you define ‘XDR’ and what role does SIEM play here? Q: How do you define ‘XDR’ and what role does SIEM play here?

article thumbnail

On Trust and Transparency in Detection

Anton on Security

This blog / mini-paper is written jointly with Oliver Rochford. Some of us remember the early days of the network IDS intrusion detections systems were delivered without customers being able to see how the detections worked . When we detect threats we expect to know what we are detecting. Sounds painfully obvious, right?

article thumbnail

IRL Analogies Explaining Digital Concepts are Terrible

Troy Hunt

As expected, the internet responded with much hilarity because no-way, no-how are any of the analogies in that video even remotely equivalent to digital piracy: And even if they were - even if you could directly compare the way both a movie and a car can be illegally obtained then yes, of course people would do it!

Internet 210
article thumbnail

‘OMG it’s a bug!’ Beware the bells and whistles around vulnerability disclosures

SC Magazine

Oh, and one more thing: it’s not really a threat to you or your organization in any meaningful sense. Additionally, it only works when two malicious, unauthorized applications are trying to communicate on your OS, a condition that would indicate you have much larger fish to fry.

Media 99
article thumbnail

Crooks Continue to Exploit GoDaddy Hole

Krebs on Security

Spammy Bear targeted dormant but otherwise legitimate domains that had one thing in common: They all at one time used GoDaddy’s hosted Domain Name System (DNS) service. Grooten told KrebsOnSecurity he suspects criminals may have succeeded at actually compromising several of GoDaddy’s hosted DNS servers. 31 and Feb.

DNS 239