Remove vulnerabilities-threats -back-to-basics-might-be-your-best-security-weapon
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

alongside Tony Sager , senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. Tony Sager, senior vice president and chief evangelist at the Center for Internet Security. TS: Like a lot of things in security, the economics always win.

Security 204
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Or even basic low level threat analysis. Chris Gray of Deep Watch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re seeing as a result. A lot of SMBs do not have security operations centers or SOCs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerabilities in Weapons Systems

Schneier on Security

Weapons and support systems will be successfully attacked. Our military systems are vulnerable. We need to face that reality by halting the purchase of insecure weapons and support systems and by incorporating the realities of offensive cyberattacks into our military planning. Any 21st century war will include cyber operations.

Military 144
article thumbnail

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Elie

Krebs on Security. At its peak, Mirai enslaved over 600,000 vulnerable IoT devices, according to our measurements. we published earlier this year at USENIX Security and cover the following topics: Mirai Genesis. we published earlier this year at USENIX Security and cover the following topics: Mirai Genesis. via massive.

IoT 107