If a Firewall is Useless What to Do?
As I was scanning the Internet for interesting relevant articles this is the one I thought was unique in discussing a fundamental issue of our time(in 2015) http://www.infoworld.com/article/2616931/firewall-software/why-you-don-t-need-a-firewall.html Plus Roger…
Stop Attacking Me – Don’t exploit My Code Bro
The Oracle CSO (Chief “Security” Officer) statements show a misunderstanding of IT security principles. IT-Security BlogNotions post is appropriate: That is why I came up with “Don’t Expose My Code…
Courts Uphold FTC Regulation-Punishment to Negligent Company
Threatpost has the story: https://threatpost.com/court-rules-ftc-has-authority-to-punish-wyndham-over-breaches/114390 From the court brief http://www2.ca3.uscourts.gov/opinarch/143514p.pdf are some interesting snippets: Let’s list the cybersecurity problems that Wyndham had: Stored CC data (which is a violation of…
Ashley Madison Hack Proves CyberSecurity Must Be Six Sigma Secure
We have to continue “learning” from high profile hacks. As you may have read in the news a “dating” site that attracts extra marital hookups has been hacked by some…
Cyberjoke Friday v1.4
Check out this computer joke section: http://www.surfersam.com/friends/funny-computer-jokes.htm Surfer Sam has several interesting computer jokes (my opinion of course) Artificial Intelligence usually beats real stupidity. I always love the old computer…
