In the article below, for obvious reasons, I loved this sub-heading: The future of work is connectivity, not proximity. The ability to hire anyone who can connect to your network opens up a whole world of possible talent. But, it … Read More
I’ve been at this blog for almost 19 years. Are you sure it’s still me writing these posts? Did I disappear and just leave it on autopilot to write posts for me long after I’m gone?
Are you sure you would know if I did?
Not everything is as it appears. We could all use a lot more skepticism, especially on topics we are already biased to believe.… Read More
A New Model for Cybersecurity? NIST Details Framework for Zero Trust Architecture Teams Are More Productive When They Don’t Work Off Hours Why You Still Need to Take Time Off in a Time of Crisis The Fox in the e-Discovery … Read More
The results speak for themselves. “The report, based on anonymised data from real organisations that have had their networks tested, said that for 71% of companies, there’s at least one obvious weakness that could provide malicious outsiders with entry into … Read More
My initial reaction to the headline was “Great, what chance do the rest of us have of not getting hacked if SANS can get hacked?” But, like Sharon, I think this is really great: “This is the part I really … Read More
If it’s on a screen, there is always a way to capture it. So maybe in online meetings, act accordingly? “Even with these restrictions, you can’t stop a participant from using their phone to record the session or using a … Read More
Smart enough to get in, not smart enough to cover their tracks when getting paid. That doesn’t seem so smart. Which goes to show, that security around Twitter could have been a lot better, and people who work there maybe should have been a little less careless. That doesn’t bode well for the rest of us when even a big tech company can’t get this right. How many of us have people on staff who might fall for this kind of phone-based attack?
What should we think of the complicated, super-smart hackers who also manage to be so easily identifiable? Should we accept that the hardest thing about any conspiracy, and this goes for all the conspiracy theories out there, is making sure one person doesn’t do something stupid and give it all away? That. actually, is nearly impossible, and is the one thing that makes most theories unbelievable to me. This hack proves to be a perfect example.… Read More