Harry had been raising hell for about ten minutes already. He had a habit of finding fault in everything, from the signature in a letter not following the template to papers being stacked improperly. But today, in fairness, his complaints had some merit: John had failed to send a draft report yesterday. Nevertheless, he didn’t have to yell. After all, no one would have been around to open it the previous evening.
As I didn’t get to attend Blackhat, BsidesLV, Defcon this year, I’ve been reading up on writeups from people that did attend to catch up on all the good knowledge that was shared.
August 22, 2019 • Insikt Group®
Click here to download the complete analysis as a PDF.
Introduction Cybercriminals are waging a war on our personal data. The latest research from IBM and Ponemon on the cost of cybercrime shows that data record breaches carry a high price tag. The price…
Some mornings when I wake up, it takes me a few minutes to remember where I am. I look around my hotel room, piecing together how I ended up here. Then, once I’ve calibrated my internal GPS (coffee helps), it’s time to start exploring.
The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework (https://attack.mitre.org/) is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” One of the most beautiful parts of the MITRE ATT&CK™ Framework is that its information can be analyzed to answer a wide variety of different questions.
Remediant, a startup that helps companies secure privileged access in a modern context, announced a $15 million Series A today led by Dell Technologies Capital and ForgePoint Capital.
By Edwin Doyle, Global Security Strategist, published August 22nd 2019
Google today announced a new long-term initiative that, if fully realized, will make it harder for online marketers and advertisers to track you across the web. This new proposal follows the company’s plans to change how cookies in Chrome work and to make it easier for users to block tracking cookies.
Delving into the world of open source license comparison is not for the faint of heart. Copy-left this, permissive that, and what, in the name of GNU, is the difference between GPL 2 and GPL 3 With over 80 OSI-approved open source licenses out there, and hundreds of others floating around the open source ecosystem, putting together an open source license comparison is no easy feat.
(Bloomberg) — Want to receive this post in your inbox every day? Sign up for the Balance of Power newsletter, and follow Bloomberg Politics on Twitter and Facebook for more.
Akamai (NASDAQ: AKAM), the intelligent edge platform for delivering and securing web experiences, today announced it is protecting CashFlows, an innovative FinTech offering comprehensive merchant services, alternative payments, and BIN Sponsorship solutions (card issuing and ATMs), from the growing threat of Distributed Denial of Service (DDoS) attacks against its cloud-based services.
By David Emm, Principal Security Researcher, Kaspersky
At this moment, on another Earth, a man is locked in a padded cell, nodding to the gibbering chorus of voices in his head and smearing out his manifesto on the grimy walls of the asylum using a jagged fingernail and his bodily fluids.
(Bloomberg) — Angela Merkel’s challenge to Boris Johnson to find a Brexit solution in the next 30 days sounds impossible. But while both sides are talking tough, officials in private say there’s still time to salvage a deal.
The Linux Plumbers Conference 2019 is coming up September 9-11 in Lisbon, Portugal. There are several tracks featuring eBPF related topics:
The current state of cybersecurity is complex, fast-moving and a critical risk to all organizations. Understanding where U.S. businesses stack up in terms of their security knowledge and defense strategy is of utmost importance. It’s critical that leaders—from enterprise to small business and government—gain more awareness of one of the greatest challenges cybersecurity is currently facing.
‘Where in the World is Peter Carlisle’: Episode 10 (Las Vegas)
A security bod angry at Valve’s handling of bug reports has released a zero-day vulnerability affecting the games giant’s flagship Steam app.
The cash-and-stock deal is expected to close in the second half of Splunk’s fiscal year, which ends Jan. 31. San Francisco-based Splunk, which went public in 2012 and carries a nearly $1.5 billion deficit, said it would be able to absorb the added operating costs from the deal. Splunk has been increasing its cloud business, which accounted for 25% of revenues in the July quarter and is expected to represent half of operations over the next few years, company officials said.