Mismanagement in Vulnerability Management Systems

I’m always scouring the net for interesting presentations and this is an interesting one, from Bsides Detroit By Gordon MacKay¹ which have been put on the Net by Adrian Crenshaw (irongeek.com)² The presentation is about a flaw in vulnerability management systems which also happens to be what Gordon MacKay programs now for Digital Defense Inc. … Read more

Chip&Pin Credit Card Adoption 8 million merchants missing?

We know EMV should be installed in your credit card acceptance machines by October of 2015 (so already 9 months past) as per PCI compliance standard. The New Pin and Chip cards are also called EMV cards (Europay Mastercard and Visa).  Pin and Chip logo above is from UK site http://www.chipandpin.co.uk/ – and it looks good. Above … Read more

Think About Security as a Constant Effort – Not Project

Security and thus also Cybersecurity needs to be thought of in a different manner. Education about information security has to be put together well. We have to understand the whole environment and people need to follow what corporate recommends for security reasons.   Why?  because individuals should not create corporate blindspots either knowing or unknowing.  (image … Read more

Can Logs be Changed By Hackers?

The latest information about a Romanian hacker getting into the ” Hillary Clinton server” interests me. The hacker claimed that hackers sometimes do not leave a trail.  So I don’t want to focus on whether it happened or not(or the ramifications of he hack – politics etc). Just on the comment of not leaving a trail … Read more