Comments
-
Exactly...
-
if only i could get a voodoo doll like that!
-
yeah, but what if your smart device is actually controlling your deadbolt? How about a double hack to rob your house??
-
Why oh why do you write these articles...now I won't be able to sleep at night.
-
and don't forget, as a commodity, the value of the data you have increases or decreases...sometimes just as rapidly as the market...so be very careful with what you have (and don't have), to ensure the value keeps rising.
-
AND, even if the internet was consistent enough, how many hosting providers are? I.E. how many of you were affected by the AWS service going down? I wasn't...but then, like my other comments all over Thwack, I don't put my network applications and data in the hands of others unless someone (i.e. a vendor) is dragging me /…
-
attack surfaces are always the hardest! I work for a fairly small organization (200 emps), but I have 15 points of internet access!
-
interesting...but what happens if the data is wrong...or misinterpreted....
-
the same way programmers hard code IP addresses into the code so the settings you put in don't take effect....POOR QUALITY CONTROL
-
yeah, no thanks...love saunas, but not polar bear plunges
-
I may not cringe anymore, but trying to move from a 2003 AD infrastructure to 2012 is still nerve wracking and not simple.
-
i'm sorry, but isn't hhhhhhhhhhhhhhhhhhhhhhh@mailinator.com legitimate????
-
unfortunately, there's so much xxxPAA regulations we have to follow, we have a whole team (aka 2 people) to deal with them! Hippa, MFIPPA, Pipeda, FIPPA...
-
so for the hacked article...what software are people using to prevent ransomware?
-
i wonder when they're going to announce me as the winner of the fridge??
-
I can't get enough diagrams...all with various detail levels, targeted to various levels of the organization - from the user all the way up to the board of directors. Each required specific information, and, when I do it right, it makes support and budget time that much easier.
-
you forgot to put my name on the winners list!
-
is it? or did you mean BASIC
-
Fixing the internet and protecting everyone from attacks is easy...the problem is the cost and differing country laws. With thousands and thousands of connection points across the globe, spanning every country, with various levels of control. Plus the millions of dollars it would cost in security equipment, it's just not…
-
i want a magical undo button for "oops" scenarios
-
I love reading Kong's posts... Ok, I'm going to get blamed for promoting my troubleshooting story again, but so what...here goes :-)
-
or cerebellum
-
isn't that dangerous???? who knows what you could do on an FTP site...
-
Does apple have a virus scanner for their iphone yet? that'd be a huge purchase opportunity.
-
I think the key factor is not to advertise so much...I mean, big corporations are always going to be targeted, as is government, but don't wave a flag...anonymity is it's own reward...
-
It's funny...and I can't really explain it...however: Two years ago I put in a TED energy monitor in my server room - it has it's own electrical panel, so the installation was easy. It shows me my CO2, estimated monthly cost, and my energy usage... The room only had a single AC unit, and I knew it wasn't enough when I…
-
Money power or fame?
-
nice!
-
im looking forward to the trophy!
-
don't get me wrong, I love LEM, and it's definitely helped identify potential issues, however, it's software. Software is programmed by people. People are not perfect, and are susceptible to persuasion, influence, corruption, and blackmail. My fear is how secure is the software I use to help secure? Trust is blind.