To Accept, or Not to Accept: Things to consider when building a Risk...
Two Minute Takeaway: Risk acceptance is a good and necessary part of all risk management. It is preferable to accept risks temporarily once it is clear they cannot be resolved for a period of time. It...
View ArticleThe “Cobra Effect” – Are you part of the password problem?
Passwords are used everywhere and for everything. It’s hard to go even one day without using at least one password whereas it’s for email, social media, to access bank accounts, etc. However, when it...
View ArticleNew vulnerability: CVE-2014-6271 remote code execution through bash
A new security vulnerability was disclosed yesterday in Bash, a shell for UNIX systems and the default shell in many distributions of UNIX including Linux and Mac OSX. This extremely damaging...
View ArticleThe exploitation of public information – A short OSINT primer
In the beginning of the Internet there was war-dialing. The practice of calling every phone number in an area, in sequence, waiting for a modem to pick up. The name originates from the 1983 film...
View Article
More Pages to Explore .....