Sat.Oct 28, 2017 - Fri.Nov 03, 2017

article thumbnail

I'm Joining Report URI!

Troy Hunt

What if I told you. that you can get visitors to your site to automatically check for a bunch of security issues. And then, when any are found, those visitors will let you know about it automatically. And the best bit is that you can set this up in a few minutes and add it to your site with zero risk. Or if you like, set it up so that it can automatically block certain types of attacks.

Risk 185
article thumbnail

Why practical Blockchain must become a reality

Thales Cloud Protection & Licensing

In just a few short years, Bitcoin, the innovative cryptocurrency underpinned by Blockchain technology, has earned broad legitimacy and won plaudits from many top technologists, investors, and even bankers. With the concept now proven, attention has shifted to the technology behind Bitcoin in the hope that it might help to solve more problems than digital currency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NopSec Unified VRM Highlight: My Risk

NopSec

IT Security and Risk teams in every organization have one common goal: to protect the company’s data from breaches by strengthening its security posture. Each member of the team has different goals (that work towards the common goal) depending on their roles. While the Engineers and Analysts are more focused on the day to day remediation of vulnerabilities, CISOs and upper level management are more concerned with the overall strategic role of cybersecurity within the organization’s goals.

Risk 52
article thumbnail

Design For Behavior, Not Awareness

The Falcon's View

October was National Cybersecurity Awareness Month. Since today is the last day, I figured now is as good a time as any to take a contrarian perspective on what undoubtedly many organizations just did over the past few weeks; namely, wasted a lot of time, money, and good will. Most security awareness programs and practices are horrible BS. This extends out to include many practices heavily promoted by the likes of SANS, as well as the current state of "best" (aka, failing miserably) practices.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Weekly Update 59

Troy Hunt

I've actually had a day off today.

article thumbnail

In Case You Missed It: Money 20/20 Conference Highlights

Thales Cloud Protection & Licensing

Money 20/20 is always one of my favorite conferences to attend. Every year, I am blown away by the innovation that is shaping the digital payments industry, and this year’s show did not disappoint. The conference features a variety of topics and sessions regarding all aspects of financial services, from cryptocurrency to banking. This year, I noticed a recurring theme: user experience, not payments, drives business.

More Trending

article thumbnail

Incremental "Gains" Are Just Slower Losses

The Falcon's View

Anton Chuvakin and I were having a fun debate a couple weeks ago about whether incremental improvements are worthwhile in infosec, or if it's really necessary to "jump to the next curve" (phrase origin: Guy Kawasaki's " Art of Innovation ," watch his TedX ) in order to make meaningful gains in security practices. Anton even went so far as to write about it a little over a week ago (sorry for the delayed response - work travel).

InfoSec 40
article thumbnail

Bypassing Browser Security Warnings with Pseudo Password Fields

Troy Hunt

It seems that there is no limit to human ingenuity when it comes to working around limitations within one's environment. For example, imagine you genuinely wanted to run a device requiring mains power in the centre of your inflatable pool - you're flat out of luck, right? Wrong! Or imagine there's a fire somewhere but the hydrant is on the other side of train tracks and you really want to put that fire out but trains have still gotta run too - what options are you left with?

Passwords 202
article thumbnail

Partner Spotlight: Q&A with Entrust Datacard

Thales Cloud Protection & Licensing

Inspired by National Cybersecurity Awareness Month (NCSAM), I kicked off our partner spotlight series earlier this month with one of our valued partners in the privileged account management space. In this piece we turn our attention to identity management and transaction security and we spotlight Entrust Datacard. The company is a provider of identity and secure transaction technologies that make business and personal experiences – such as making purchases, crossing borders, accessing e-governme

article thumbnail

63 Percent of IT Security Experts Are Unsure How to Fight Targeted Attacks

eSecurity Planet

Still, 78 percent of IT business decision makers say they already spend enough, or too much, on protection from such attacks.

42
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Secdo 5.0 Makes Behavioral-Based Bet on Automated Incident Response

eSecurity Planet

Secdo 5.0 offers security professionals new, behavioral-based tools to block threats to their systems.

40