Security

No, you’re not being paranoid. Sites really are watching your every move | Ars Technica

https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/ If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you’re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors’ keystrokes, mouse movements, and scrolling behavior in real time…

Getting Started with IoT Security with Threat Modeling

https://www.denimgroup.com/resources/blog/2017/11/getting-started-with-iot-security-with-threat-modeling/?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BtGhVz%2BNYQRiSgJC%2Bt%2FEWQQ%3D%3D The security of IoT systems can be exceptionally complex because of the large number of components, potentially extensive attack surface, and the interactions between different parts of the system. Threat modeling is a great starting point to understand the risks associated with IoT systems. The challenge with this trend is that IoT devices are just computers

Containers and microservices complicate cloud-native security

http://www.theserverside.com/feature/Containers-and-microservices-complicate-cloud-native-security?utm_campaign=Black%20Duck%20Press&utm_content=60709505&utm_medium=social&utm_source=facebook Developing applications with microservices and containers may be a modern approach to software design, but traditional software flaws still remain a problem when addressing cloud-native security. When you think about microservices-architected, there’s a wide range of, I guess you could say opinions, about what that means.  In this age of DevOps and cloud-native development, the software

Gas station runs Windows

What is technology inside gas station where you just put in credit card and fill the tank yourself. I has already taken a look at one Verifone payment terminal on what software it runs (it runs Linux). Today I got a view of what is technology used on similar device made by Dresser Wayne AB.

Man With Machine: Harnessing the Potential of Artificial Intelligence

https://securityintelligence.com/man-with-machine-harnessing-the-potential-of-artificial-intelligence/?cm_mmc=PSocial_Facebook-_-Security_Detect%20threats%20-%20QRadar-_-WW_WW-_-23012462_Tracking%20Pixel&cm_mmca1=000017NK&cm_mmca2=10004134&cm_mmca4=23012462&cm_mmca5=48989195&cm_mmca6=bdfe5818-7fea-4ba1-a728-fef91b396b4d&cvosrc=social%20network%20paid.facebook.WW%20Newsfeed%20Job%20Title%20CISO%20Discover%20SI%20Blog%20Engagement%20SI%20Watson%20Man%20With%20Machine%20AI%20Watson1%20_SD%20Behav_DesktopMobile%20Tablet_1x1&cvo_campaign=000017NK&cvo_pid=23012462  When we think of artificial intelligence (AI), we think of robots — machines that mimic human behavior or thought. This is partly the influence of comics, novels, movies and other pop culture tidbits, but the boundaries of AI have progressed far beyond this basic personification.  At its most basic level, machine learning, a subset of

A Formula for Success with GDPR – IBM Analytics – Medium

https://medium.com/ibm-analytics/a-formula-for-success-with-gdpr-c7fbd2a5b2f The General Data Protection Regulationcomes into effect on May 25th 2018 and many organizations are already seeking outside help to understand and navigate the complexities. As you consider connecting with an advisor, this brief series of posts lets you know some of the most important questions to ask, how to set priorities. You should consider having a