Booby-trapped sites delivered potent new backdoor trojan to macOS users
Category Archives: Blog
Achieving these lofty goals is likely to be costly; however, OMB advised: “Agencies should internally source funding in FY22 and FY23 to achieve priority goals, or seek funding from alternative sources, such as working capital funds or the Technology Modernization Fund.”
Immediately post-Brexit, British data protection laws or the UK GDPR aligned with the EU GDPR. The current proposals being considered create deviations between the UK data protection requirements and EU GDPR. The goal of many of these proposed changes are to provide a more flexible and risk-based accountability framework. For example, removing requirements for organisations […]
For the business, there are several relevant moves in the industry. These introduce authentication and access controls that leverage cloud infrastructure to create a virtual boundary around the business that’s strong but flexible. Then, data flows can be monitored and controlled to detect or otherwise defeat backdoor communication channels.
Nicole Perlroth has been on the frontlines of cybersecurity in a different way: as a journalist. The bestselling author, who chronicled the cyber-weapons arms race in
A business needs to trust the authors of the software it uses. The business must trust the authors don’t add backdoor functionality into the software that would undermine their security, intentionally or unknowingly. A respectable business is not going to intentionally add a backdoor, so normal supplier selection processes will ensure the business is not […]
From a security and risk mitigation perspective you want an approach that is consistently effective, especially when a newly discovered vulnerability is being actively exploited. However, the Log4J vulnerability renders virtually every website as potentially compromised. This means that web security solutions that only rely on reverse DNS resolution, or IP reputation are ineffective – […]
A business wants to be sure it’s safe to run the software they use. That not only means trusting the authors of the software, but also being sure that the software which is run is actually the software the authors created, and not software that’s been modified or created by somewhere else. In practice, this […]
Too often, I talk to customers who had been settling previously for a sub-optimal, legacy DLP solution because they feared the migration process was just too complex and frustrating. The perception of DLP migration as challenging is not a secret.