vendors
The 2021 Security Outcomes report and better research methods
Something extraordinary happened recently in the Information Security research report area. Why I think it’s so extraordinary might have passed you by, unless you geek out on statistical methods in opinion polling ...
Sloppy patches are a breeding ground for zero-day exploits, says Google
Security researchers at Google have claimed that a quarter of all zero-day software exploits could have been avoided if more effort had been made by vendors when creating patches for vulnerabilities in ...
5 Indicators of Cyber Security Market Failure
6 Minute Read. By Simon Moffatt.Let us start with some brief definitions to get us all on the same page. Firstly – what is meant by the term “market failure”? A textbook ...
Thirty-four years in IT – System Administration, Backups, and Data Centers (Part 5)
As a side effect of building and running the backbone, I introduced UNIX systems into what was then a wholly VMS organization. We initially used Linux - roughly from 1994 - 1997, ...
The Challenges of Managing Third-Party Vendor Security Risk
It’s no longer enough to secure your own company’s infrastructure; you now must also evaluate the risk of third-party vendors and plan and monitor for breaches there, too. Data breaches are reported ...
A letter to our Apple Account Exec
A couple of days ago myself and a colleague of mine ran into our Apple account exec. The conversation ended up in the security space, as is probably appropriate considering Apples recent ...
Apple joins the big leagues
I've been hearing 'OS X is secure' for a decade now. For a decade, I've been challenging that assertion. The challenges to that assertion generally end up with a response of 'because ...
Oracle Support portal: HTML 5 replaces Flash
Oracle Support is upgrading their web interface from Flash to HTML5. I’m happy. I no longer have to twiddle my thumbs waiting for Flash to load:That was really annoying. The consolation prize ...