Latest — page 34
Tanacon, Security, and Lack of a Threat Model
Tanacon 1.0 was an unmitigated disaster. Not only is this a reminder that physical security is critical but it's an example of a failure to analyze risk properly (or at all).
Culture Change Is Hard
We (the IT community) don't push for cultural change because it requires persistent and dedicated long term work. That runs counter to the usual pace of technology. We (the security community) are even worse off...
Ethics And Action In Technology
Ethical questions and quandaries are tough enough to work though when they are theoretical. But when you're confronted with them in the real world, there are usually real world consequences. This makes a hard situation even harder. What do you do? What can you do?
Ethics In Technology And Cybersecurity
How new technologies are used and built is really up to us. Regardless of your moral compass, it's important that you discuss the creation & use of these tools with your teams and larger community.
Getting Started In Cybersecurity & Perspective
Getting started in cybersecurity can be hard. Sticking to core principles is critical as technology will change. But one of the hardest aspects to cultivate is perspective. How can you tackle that challenge?
Apple, Graylock, And Context
With iOS 12, Apple will reduce the time an iOS device responds to the USB port when locked down to an hour. Having a hard time understanding why that matters to you? It's because it really won't. It is however a gap in the security posture of these devices that Apple is fixing.
Google In Schools
G Suite for Education is making waves in the Canadian education market. And why not? It looks like a win-win-win. Too good to be true?
Cryptocurrency & High Value Targets
Cryptocurrency is a digital asset. As such, it's a major target for cybercriminals. We've seen attack after attack in the past few months as exchanges, apps, and other players in the cryptocurrency market aren't aligning their security to the threats they face.
Net Neutrality
Net Neutrality is a simple dictate that states all network packets must be treated equally. This—of course—tanks a few business models for ISPs and in the US, they have successfully lobbying to remove previously regulations.
Apple, WWDC, and Your Privacy
As usual there was a host of announcements at WWDC this year. No major spotlight stealers, what does that mean for security?
Developer Workflow 101
The push to move to a "DevOps" culture is a great opportunity to improve security. But first, we need to understand the general development workflow!