Tuesday, September 18, 2018

Cyber criminals outspend businesses in cyber security battle

Cyber criminals outspend businesses in cyber security battle: "Cyber criminals are spending 10 times more money finding weaknesses in the cyber defences of organisations than the organisations they target are spending on protecting against attack." Really?

Businesses collect more data than they can handle, only half know where sensitive data is stored - Help Net Security

Businesses collect more data than they can handle, only half know where sensitive data is stored - Help Net Security: 65% are unable to analyze all the data they collect and only 54% of companies know where all of their sensitive data is stored.

Healthcare Data Presents Lucrative Target for Cyberattackers

Healthcare Data Presents Lucrative Target for Cyberattackers: "The healthcare industry will remain one of the most targeted sectors by cyberattackers because of its valuable healthcare data"

Continental Automated Buildings Association

Contact Us - the Continental Automated Buildings Association.

(26) IoT and smart buildings and cities (Part 2, the downside) | LinkedIn

(26) IoT and smart buildings and cities (Part 2, the downside) | LinkedIn: As exciting as smart cities and buildings sound, and as big as the market is projected to grow, the path into this promising future will be bumpy.

Techno-chauvinism or just dumb

Installing and Running Elasticsearch | Elasticsearch: The Definitive Guide [2.x] | Elastic

Installing and Running Elasticsearch | Elasticsearch: The Definitive Guide [2.x] | Elastic: The only requirement for installing Elasticsearch is a recent version of Java. Preferably, you should install the latest version of the official Java from www.java.com.

Research reveals four distinct personality clusters

Research reveals four distinct personality clusters... OCEAN

https://www.medicalnewstoday.com/articles/323092.php

NPR/Marist Poll Results September 2018: Election Security

Thursday, September 6, 2018

Elechouse, Arduino Play House

Elechouse, Arduino Play House Proxmark thingie...

http://www.elechouse.com/elechouse/

Fighting ransomware with network segmentation as a path to resiliency - Help Net Security

Fighting ransomware with network segmentation as a path to resiliency - Help Net Security: 'Organization can achieve network resiliency and survivability through a strategy embracing network segmentation in general, and micro-segmentation in particular."

Defeat Ransomware Attacks with Network Segmentation | BlackRidge

Defeat Ransomware Attacks with Network Segmentation | BlackRidge: "when attack software has sneaked its way through your firewall and is ravaging your critical systems — you're going to wish you had built internal segmentation into the network"

Wednesday, September 5, 2018

CyberEdge 2018 Cyberthreat Defense Report | CyberEdge Group

CyberEdge 2018 Cyberthreat Defense Report | CyberEdge Group: download CyberEdge’s fifth-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries

Scammers pose as CNN's Wolf Blitzer, target security professionals | CSO Online

Scammers pose as CNN's Wolf Blitzer, target security professionals | CSO Online: "The person responsible for the text messages pretends to be CNN's Wolf Blitzer, and offers security professionals $300,000 yearly to come on to "The Situation Room with Wolf Blitzer" and act as security commentators. All the victim needs to do is pay $3,000 via Western Union to get security clearance and approval."

Monday, September 3, 2018

How NotPetya ransomware used legitimate tools to move laterally

How NotPetya ransomware used legitimate tools to move laterally: "demonstrated the abuse of legitimate tools to extend network penetration. Referred to as living off the land, this strategy offers several advantages to the attacker,"

Saturday, September 1, 2018

Litigating the Implied Covenant of Good Faith

Litigating the Implied Covenant of Good Faith: "The cases are challenging to both win and defend, and the results are unpredictable because the parties did not expressly contract to limit their risk."

Exceptions to At-Will Employment in California

Exceptions to At-Will Employment in California: "At-will employment is employment that either party (employer or employee) can terminate at any time, for any reason or no reason at all."