One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 494688
Date de publication 2018-03-02 14:00:00 (vue: 2018-03-02 14:00:00)
Titre Things I Hearted this Week 2nd March 2018
Texte This week London has been in the midst of snowmageddon! An inch of snow ground the city to a halt with schools closed and the capital on red alert. Fortunately, one of the perks of working from home is that I get to stay on top of the security news regardless of the weather, so put on your snow boots and jump right in. Trading stocks in the wake of breaches The US securities and Exchange Commission (SEC) has waned high-ranking executives not to trade stocks before disclosing beaches, major vulnerabilities and other cybersecurity related incidents. SEC statement on public company cybersecurity disclosure (PDF) | SEC After Intel & Equifax Incidents, SEC Warns Execs Not to Trade Stock While Investigating Security Incidents | Bleeping Computer Tracking your sold hardware Many devices now come with tracking features to help you find it if it gets lost or stolen. It started predominantly with phones, but now is in most laptops, desktops, and plenty of smart devices. The trouble is that location tracking isn’t something we intuitively ask for when buying or selling an item. We just assume that the seller has disabled it, or it wasn’t enabled in the first place. Will we get to a point where before buying a smart teddy, a kid will ask if its been factory-wiped and all credentials removed? How I sold an old Mac and unknowingly had access to its location for over 3 years | Bredon Mulligan / Medium Cover your own assets John Carroll wrote an interesting blog post on influencing business layers that might not get infosec. Cover your own ass(ets) | CTU Security Cybersecurity Style Guide How many times have you wished you had a cybersecurity style guide to help you understand how to pronounce security phrases, or write a word, or the definitive meaning of a term. Well, your wishes have all been answered as Bishop Fox has created a style guide for you. Web Semantics: The Bishop Fox Cybersecurity Style Guide | Wired Download the Bishop Fox Cybersecurity Style Guide (PDF) | Bishop Fox Revenge Hacking Well, at least the motive was easy to establish. Man admits hacking former employer’s computer system for revenge | Hackread Teach a man to Phis
Envoyé Oui
Condensat $15 $15k 000 2018 27001 2nd about access account accounts acquisitions admits ads advanced advice after ago alert all allowed almost among anand answered any apple: appsecure are ars ask ass assets assortment assume assumptions awareness bank battle beaches because been before benefits billion bishop bleeping blog boots bounty breaches bredon brian broad brute build business but buying call can capable capital card carroll certification cfr city closed code come commission company computer conceal consulting cornerstone could cover cpu created credentials credit criticizing ctu cyber cybersecurity cynic’s deception definitive desktops details devices different digit disabled disclosing disclosure does download draining earned easy effectively email employer’s enabled equifax establish ets exchange execs executives facebook facebook’s fact factory features field figured find first five forced former fortunately found fox from futile get gets good google great ground guide hack hacking hackread had halt hardware has have hearted help helped high him his home honan how inch incidents influence influencing info infosec instead intel interesting intrusive intuitively investigating investment irish isn’t iso iso27001 item its j4vv4d john jump just kid knake knows landscape laptops layer layers least limit limitations location london look lost lynch mac major make makes making malware man mandatory many march market meaning medium mess michael microsoft's midst might mining months more most motive mulligan myself ncsc network new news newsweek nice not now number old one organisations other out over own paid password pdf perks phish phish… phishing phones phrases place plenty point points polarising policy post posted prakash predominantly programmes pronounce protect public put quit raises random ranking rate recap recent red regardless register related relied removed researcher reset revenge right robert scam scan schools sec second securities security seller selling semantics: shares slightly slurp smart snow snowmageddon sold some something somewhat sound space standard start started statement stay steals steps stock stocks stolen style supremes system take taking teach technica technique technologists technology: teddy term thing things thoughts times together top tracking trade trading trouble two understand unknowingly user uses view vulnerabilities vulnerability wake waned warns wasn’t watch way weather web week well what when where which why will wiped wired wisdom wished wishes word work working worth write writeup wrote yeah years your
Tags
Stories Equifax
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: