How Many Companies are getting Attacked By China?
It may be hard to source some attacks, but it depends on the attack as well. We also have to decide what data to use as to who got attacked?…
Defend Your Systems
It may be hard to source some attacks, but it depends on the attack as well. We also have to decide what data to use as to who got attacked?…
Another Thotcon presentation was very good, unique and moves the industry forward. Julian Cohen presented This idea: “Understanding Your Adversaries” In his talk: “Adversary-Based Threat Analysis” He explained that in…
Thotcon (Chicago’s Hacking Conference) thoughts… Saw several good Cybersecurity presentations while one of the keynotes “Josh Corman” discussed the burnout of the infosec opsec community. This is a problem for…
If there is no way to fix a vulnerability what do you do if you have a camera with a vulnerability? Here is the quote on Threatpost (from the engineer…
In the field of Cybersecurity we have to do a lot of basic things: as discussed in Behavioralscientist.org So what is your plan? Firewall, Antivirus, IT people vigilance, updating devices…