One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 455330
Date de publication 2017-12-29 14:00:00 (vue: 2017-12-29 14:00:00)
Titre Things I Hearted this Week – 29th December 2017
Texte And here we are, the last week of 2017! Congratulations for making it through and thank you for sticking with us. I really enjoy pulling together these weekly recaps, and I hope you enjoy them and find them informative. This week has been a quiet week as people seem to be in constant limbo as to whether they should be working or vacationing. But I searched tirelessly for you – because that’s just the kind of person I am. Enjoy, and hope to see you again in 2018. Vendor Analyst Briefings Our very own Kate Brew started off a discussion on Twitter a few days ago on how many vendors don’t know how to brief analysts. Anton Chuvakin of Gartner chimed in with a detailed listing of do’s and don’t’s, followed closely by Adrian Sanabria sharing his experiences. Not wanting to be left out, I also added my 2cents. Thus completing the trilogy. Important: How to Impress / Annoy an Analyst During a Vendor Briefing? Best / Worst Tips Here! | Anton Chuvakin, Gartner What is your product and what does it do? | Adrian Sanabria, Savage Security Analyst Vendor Briefings | Javvad Malik, J4vv4D Dressed for success Ed Amoroso offers some personal advice (especially for Millennials) on proper dress selection for men and women in the modern technology-based work environment that focuses on showing respect for others. Dress for Tech Success | Edward Amoroso, LinkedIn Credential Stuffing With quite literally billions of leaked credentials available online, it is highly likely that some of these will be credentials for your customers — or worse — from your employees or organisation. These details can then be used by nefarious people to then systematically attempt to log into your service/business, in an attempt to takeover these accounts. This article will provide you with an overview of why and how these attacks take place, as well as provide you with some fingerprints and identifiers to help you monitor your environment for these types of attacks. Credential Stuffing: How breached credentials are put to bad use. | Breachinsider.com Cryptocurrency mining malware Digimine spreads via Facebook messenger using a Google Chrome browser extension. This isn’t the first, and certainly won’t be the last example of cryptomining malware – something we may see increase in 2018. I should have added it to my list of predictions! Digimine Malware Steals Your Computer Power to Mine Crypto-Currency | eWeek Rating Citizens The Chinese government plans to launch its Social Credit System in 2020. The aim? To judge the trustworthiness – or otherwise – of its 1.3 billion residents
Envoyé Oui
Condensat 2017 2018 2020 29th 2cents about accounts added adrian advice again ago aim already also amoroso analysis analyst analysts annoy anton any are article articles attacks attempt available awesome bad based because been being best big billion billions boss breached breachinsider brew brief briefing briefings brother browser but can cash certainly chimed china chinese chrome chuvakin citizens closely cold com communicator completing computer congratulations constant content countries credential credentials credit crypto cryptocurrency cryptomining currency customers data dataquest days december deep depending detailed details digimine digital discussion dispels do’s does don’t don’t’s doubt dress dressed during edward emotionally employee employees enjoy environment especially eweek example exchange experiences extension facebook feel find fingerprints first fivethirtyeight fivethirtyeight's focuses followed from gartner generate good google government graphs greatly hard has have head hearted help here highly his hope how identifiers important: impress impressed increase information informative infosec isn’t it’s its j4vv4d javvad judge just kate kidnapped kidnapping kind know last launch leaked learned left less likely limbo linkedin list listing literally log major making malik malware many may means meets men messenger millennials mine mining models modern monitor moves naturally nefarious news nonetheless not off offers online organisation others otherwise out overview own people performance person personal place plans post power predictions predictors product proper provide pulling put python quickly quiet quite rate rating read real really recaps remembering residents respect rounds safe sanabria savage science searched security see seem selection service/business sharing should show showing social some something spreads started steals sticking story students stuffing stuffing: stumbled success surprising system systematically take takeover team tech technology than thank that’s them then these thing things threat through thus tips tirelessly today’s together top trilogy trustworthiness twitter two types ukraine unfortunately upon use used using vacationing valuable vary vendor vendors very visualizations wanting washington week weekly well what where whether why will wired women won’t work working worse worst worth your
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: