Pages

Categories

Search

 

Posts Tagged: Security

By John Scott Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. etc, but really should it be? It seems more like a jobs program that moves headcount from one part of the enterprise to the expensive nerdy-si...

By Katie Kennedy Every year for 19 Years Symantec has produced an Internet Security Threat Report, capturing insights which can inform defenses.  Their April 2014 report has proven to be particularly insightful, foreshadowing many of the events seen from that month to today.   For example, in 2012...

By Shannon Perry One of the simplest steps to bolstering cybersecurity is employing caution and complexity vis-à-vis passwords. Good passwords cannot be found in the dictionary; good passwords do not consist of only letters or only numbers; good passwords do not get shared with friends and family. ...

By George Romas Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Wait, that might be vulnerable to a comic book dictionary attack (bonus points for Superman fans), so let’s add some numbers and special characters: M4xyZ!ptL#K. Not bad, but suppose policy requires ...