Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effectively mitigate risk without hampering business agility.
Source: Keeping the Business Safe Across Hybrid Cloud Environments – Dark Reading
A new wave of document attacks targeting inboxes do not require enabling macros in order for adversaries to trigger an infection chain that ultimately delivers FormBook malware.
Source: Word Attachment Delivers FormBook Malware, No Macros Required
Panera didn’t fix flaw for 8 months; 37 million records were allegedly exposed.
Source: Panera accused security researcher of “scam” when he reported a major flaw
A conversation with the founder of O’Reilly Media on how we can take back control of our technology and our lives.
Source: Tim O’Reilly: ‘WTF’ Does Not Stand for ‘What the Future’
A few years ago, I worked at a web design agency as a product manager. The part of the job I loved the most was working on product with our design team and clients. Unfortunately, this was only about 10 percent of the work that I actually got to do. The majority of the time, I was trying to control the constant flow of stuff–keeping track of meeting notes, searching for files, and trying to stay up-to-date with the latest technology news.
Source: How Clutter Affects Your Brain (and What You Can Do About It)
It seems as if every time I need to reload a physical system, I’m searching the Internet to find a way to create a bootable USB drive from a Windows 10 or Windows Server 2016 ISO. I always se…
Source: Use PowerShell to create a bootable USB drive from a Windows 10 or Windows Server 2016 ISO
It is a truth universally acknowledged in the infosecurity community, that giving away free USB sticks only leads to trouble. On countless occasions we’ve seen… #malware #taiwan #usbsticks
Source: Cybersecurity quiz winners rewarded with malware-infected USB sticks
At Ignite this week, I had a chance to sit down with Jeff Melnick to talk about the threats impacting Active Directory.
Source: Petri Dish: Chatting with Jeff Melnick About the Threats to Active Directory – Petri
The U.S. government has issued a rare technical alert, warning that attackers are continuing to compromise organizations across the energy sector, often by first
Source: Alert: Energy Sector Hacking Campaign Continues