Remove Authentication Remove Case Study Remove Military Remove Risk
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

You have to show to me that you're using multi factor authentication that you're doing vulnerability scanning and mitigation that you're harming your niche. It's almost like we're doing a global global economics case study as to what happens and how it happens. you're aligning to a framework, whatever. These are becoming.

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

It’s refreshing to see a government executive order that understands technology trends such as “zero trust”, is able to delineate “Operational Technology (OT)” from “information technology (IT,)” and can talk intelligently about supply chain risks. Bryson Bort , CEO, SCYTHE.

article thumbnail

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? Machine to machine connection and communication needs to be authenticated to access systems, so this technology is where the rubber meets the road, with respect to this debate.