“Here Be Dragons”, Keeping Kids Safe Online

“Here Be Dragons”, Keeping Kids Safe Online

| | Features
Sitting here this morning sipping my coffee, I watched fascinated as my 5-year-old daughter set up a VPN connection on her iPad while munching on her breakfast out of absent-minded necessity. It dawned on me that, while daughter has managed to puzzle out how to route around geofencing issues that ... Read More
When Disaster Comes Calling

When Disaster Comes Calling

| | Features
There are times like this when I can’t help but wonder about disaster recovery plans. A large number of companies that I have worked at or spoken with over the years seemed to pay little more than lip service to this rather significant elephant in the room. This came to ... Read More
Never patch another system again

Never patch another system again

| | Features
Over the years I have been asked a curious question numerous times. ‘If we use product x or solution y we wouldn’t have to patch anymore, right?” At this point in the conversation I would often sit back in my seat and try to look like I was giving their ... Read More
IoT And Your Digital Supply Chain

IoT And Your Digital Supply Chain

| | Features
While there is a mad rush to stake claims across the Internet for things like connected toasters, coffee makers and adult toys it seems security falls by the way side. The post IoT And Your Digital Supply Chain appeared first on Liquidmatrix Security Digest ... Read More
Blackhat, BSidesLV and DEF CON Parties 2018

Blackhat, BSidesLV and DEF CON Parties 2018

| | Features
Back once again for the Blackhat, BSidesLV and DEF CON Parties 2018. Here is the list. Please note that this is a work in progress and I'll be sure to add more as I become aware of them. The post Blackhat, BSidesLV and DEF CON Parties 2018 appeared first on ... Read More
If An Infosec Policy Falls In The Forest

If An Infosec Policy Falls In The Forest

| | Briefings, Features
When you are building an Information Security practice you need a solid governance structure in place. For those of you who might not be familiar we can look at it a more accessible way. If you are building a house you need a solid foundation otherwise the thing will collapse ... Read More

Bots and Retail: From Bricks to Clicks

As we step around the smoldering husks of systems from the holiday shopping season and those that were affected by Spectre and Meltdown madness, we can’t help but to look at the road that took us to this point. Of course I’m being somewhat tongue and cheek. Years ago I ... Read More
Akamai

Does Your Cybersecurity Strategy Include Jedi Knights and Imperials?

|
What makes for a good cyber security strategy? There are all sorts of directions we could take this discussion. For instance, do you handle security issues in a reactive or proactive manner? Do you become unnecessarily preoccupied by the possible threat posed by the sharks in the ocean? Or better ... Read More
Blackhat, BSidesLV and DEF CON Parties 2017

Blackhat, BSidesLV and DEF CON Parties 2017

Parties Back once again for the Blackhat, BSidesLV and DEF CON Parties 2017. Here is the list. Please note that this is a work in progress and I’ll be sure to add more as I become aware of them. Please note that this sched should work fine in most smart ... Read More
Unnecessary Doxing Of A Researcher

Unnecessary Doxing Of A Researcher

| | Briefings
Doxing and ransomware were unfortunate bedfellows this weekend when we saw the unnecessary doxing of a researcher during the massive WannaCry ransomware outbreak. I’m pissed and I’m looking at you The Sun UK, The Daily Mail and The Telegraph. A security researcher using the Twitter handle @MalwareTechBlog became an accidental ... Read More
Loading...