Remove Authentication Remove Case Study Remove IT Remove Military
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Well, unlike large organizations, small to medium businesses lack the full accompaniment of network defenses. So they’re often unprepared when a nation state APT choses to focus on them. A lot of SMBs do not have security operations centers or SOCs. I’ve spoken about this before, about managed service providers or MSPs.

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

While some of the measures stipulated in the order are considered table stakes like multi-factor authentication, the fact that the order exists will help to raise the collective security posture of products and services. The new executive order is a swift response from the administration. It also lays a firm foundation to build upon.

article thumbnail

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? Machine to machine connection and communication needs to be authenticated to access systems, so this technology is where the rubber meets the road, with respect to this debate.