The most recent content from our members.
When it comes to IT security, it can feel overwhelming. What needs securing and at what level? How do you prioritize? But when considering risk, this is very different conversation. Changing the conversation from security to risk helps shape an informed and balanced approach. Tim Brown discusses how to apply a risk-based…
Please can WithSecure Elements Agent be added as a 'Known Antivirus'? At the moment, under 'Risk Management', SWSD says that our assets don't have antivirus software installed when they do.
In Risk Management you have 4 risks it detects. Every detected computer is added to the specific risk. As example if a computer does not have an antivirus installed it will create a risk. If another is detected it is shown in same risk. When we want to assign these risks to our engineers we are able to create one incident…
Security apathy is no joke. Brandon Shopp, group vice president of product strategy, highlights data from a recent SolarWinds study and provides five tips for combatting security apathy in your agency. A new study—the SolarWinds IT Trends Report 2021—suggests, although tech pros are confident with their work from home and…
Hey THWACKers! Welcome back for week 2 in machine learning (ML). In my last post, Does Data Have Ethics? Data Ethic Issues and Machine Learning, you may have noticed I mentioned "evil" four times, but also mentioned "good" four times. Well, you're in luck. After all that talk about evil and ethics, I want to share with you…
My teenage daughter thinks my technology job in security is boring most of the time (especially when I talk about it in front of her)- but when she heard about the SnapChat breach, I quickly received a call asking for advice. The user names and phone numbers of many users were breached and exposed. So should my daughter…
Welcome to the last in this series of posts about machine learning, artificial intelligence, and so many other topical points of discussion. If this is your first time here, feel free to check out the previous articles: Does Data Have Ethics? Data Ethics Issues and Machine Learning Machine Learning and Destroying the…
Hello THWACKers – long time no chat! Welcome to part one in a five-part series on machine learning and artificial intelligence. I figured what better place to start than in the highly contested world of ethics? You can stop reading now because we’re talking about ethics, and that’s the last thing that anyone ever wants to…
Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking about; you can still find them at many malls or theme parks, and even some downtown city streets. It’s usually a backlit map on a pillar with a…
Security tools: sometimes it seems that we never have enough to keep up with the task of protecting the enterprise. Or, at least it seems that way when walking the exhibit floor at most technology conferences. There’s a veritable smorgasbord of tools available, and you could easily spend your entire day looking for the…
It looks like you're new here. Sign in or register to get started.