The One Where We Talk Politics
Follow these topics: Personal
Follow these topics: Personal
It makes sense, for the reasons Jim points out. Your ability to collect ransom payments is diminished if the organization has backups they can simply rebuild with. So, if you can find a way to lock not just the live data, but also the backups, you stand to make more money.
What I wonder is if this will cause organizations to look at that old-school offline backup option? Keep a copy of your data physically away from your network, locked in a drawer or closet, etc.
But, is that even feasible any longer?
“We are living in a world in which a handful of high-tech companies, sometimes working hand-in-hand with governments, are not only monitoring much of our activity, but are also invisibly controlling more and more of what we think, feel, do and say. The technology that now surrounds us is not just a harmless toy; it…
One common theme I hear from “social media experts” is to make sure and keep your personal business out of the professional image you create for yourself online. Many people have come to interpret that as keeping separate profiles for their personal life and their professional life. This could be a mistake. Typically the argument…
I love his response to anyone who suggests that we don’t need privacy if we aren’t doing anything wrong. OK, go ahead and email me the passwords to ALL of your email accounts so I can troll through, read what I want, publish what I find interesting, etc. Also note the way people like Eric…
Utilizing the Wi-Fi in the training room to catch up on email, and uploading a handful of photos from the last couple of days. Class has been good in terms of learning, but it’s a mental drain. I’m looking forward to Friday and Saturday and being able to go back to just being a tourist….
In my experience, and in the experience of many others as well, unfocused attempts at visualization over raw, unreduced data produce visualizations that are not particularly useful for security operations. Visualization does have tremendous potential to bring value to security operations when leveraged properly. Performing data reduction by posing specific, targeted, incisive queries into the…