article thumbnail

Zero Trust and the Failure of Sampling: Two Important Cybersecurity Trends

Joseph Steinberg

If compromising a single device can lead to a hacker eventually moving laterally and wreaking havoc, or is itself likely to adversely impact a business, relying on sampling may lead to seriously adverse consequences.

article thumbnail

BSides Philly 2020 – Nick Delewski’s ‘Wireless WiFi: Think More About What Wireless Really Means’

Security Boulevard

The post BSides Philly 2020 – Nick Delewski’s ‘Wireless WiFi: Think More About What Wireless Really Means’ appeared first on Security Boulevard. Many thanks to BSides Philly for publishing their outstanding videos on the organization's YouTube channel.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DEF CON 29 Voting Village – Susan Greenhalgh’s ‘Wireless Odyssey’

Security Boulevard

The post DEF CON 29 Voting Village – Susan Greenhalgh’s ‘Wireless Odyssey’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Voting Village videos on the Conferences’ YouTube channel.

article thumbnail

Anti-tracking tool tells you if you're being followed

Malwarebytes

He served as a federal agent for the US Department of Homeland Security for 21 years; he is the founder of an infosec consultation company; a hacker; a certified SANS instructor; and a digital forensics expert. The anti-tracking device works by scanning for wireless devices and checking if these have been present within the past 20 minutes.

article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

a world leader in memory products and technology solutions, is proud to announce it has won the following Global InfoSec Awards for its encrypted USB solutions family from Cyber Defense Magazine (CDM), the industry’s leading electronic information magazine: Data Loss Prevention Market Leader. About CDM InfoSec Awards.

InfoSec 40
article thumbnail

Achieving PCI DSS Compliant Firewalls within a Small Business

Security Boulevard

Establish a network diagram to identify all connections between the cardholder data environment and other networks, including any wireless networks. Install perimeter firewalls between all wireless networks and the cardholder data environment and configure these firewalls to filter only the authorized traffic for business purposes.

article thumbnail

Thrive today with not just being smart but being cyber smart

CyberSecurity Insiders

Enlist passionate people across all areas of the organization and not just the IT team to champion security, model best practices, support infosec events and campaigns, and continually raise awareness. Being savvy about wireless. Develop a ‘security champions’ program. Owning your line presence. Locking down your login.