I’m had a hard time following this. There’s a big listing of “vulnerable code” I read up and down, butRead more
They might have a point a lot of people try to implement their own crypto without a good background inRead more
The UK Information Commissioner is concerned about the use of facial recognition in a private King’s Cross-based development.Read more
Credential stuffing is popular because it pays off, a report from Google has found.Read more
The number of data breaches is on the rise in 2019.Read more
Thank you for this post! I always appreciate content of this type. Just a bit of feedback from someone whoRead more
Oh boy, where do I start with this? There is a need to practice often, so practice every time youRead more
These devices – including both Apple and Microsoft Bluetooth devices – advertise their availability on open channels, and this opens the way for global device tracking. With spyware in the IoT becoming a major source of concern for cybersecurity researchers, this new research indicates that the problem may be even larger than we imagined.
Central bank hit by hackers but market data remains safeRead more
Security experts as rock stars
You could be forgiven for expecting a rock band to take the stage.
The arena filled with people. Laser lights danced across the assembled throng. A bass back-beat thumped somewhere mysterious. A mighty roar from the speakers while this reporter fumbled for earplugs, a moment too late. A man took the stage, armed only with a head mic and a clicker.
Not a rock star. A security expert. He spoke of secure software development and deployment best practices. He spoke of automation. Of changing security culture.