Your #CyberAware Checklist
In celebration of Cyber Security Awareness Month, we’re bringing you this checklist to make sure you stay #CyberAware not only in October but all year long. ✔ Update your passwords. According to National Institute for Standards and Technology (NIST) guidance, you should consider using the longest password or passphrase permissible. Be sure to customize your passwords […]
QUIZ: Does your Organization Cultivate an Enterprise-Wide Culture of Cyber Security Responsibility?
From customer-facing employees, to the IT team, to the C-Suite, cyber security is everyone’s responsibility. Answer the questions below to find out how prepared your workforce is to defend against today’s cyber threats.
Practical Steps Toward Compliance With OpenSCAP
In this blog I described some of the logical problems with vulnerability scanners. False positive and false negative errors. Additionally, the worry that problems exist but our tool hasn’t even tried looking for them. Let’s try to make this practical! I’m working on a consulting job as a sub-sub-contractor on a U.S. Department of Defense […]
What Is a GAN And Is It Dangerous?
I enjoy being deceived sometimes. The magicians Penn and Teller do a great job of deceiving audiences. The website https://www.thispersondoesnotexist.com/ demonstrates a different kind of deception: computer-generated images that look incredibly realistic. This is different than the deepfake videos where one person’s face is attached to another’s body. The method the site uses is called […]
Facial Recognition Is Now Easy to Implement: What Does That Imply?
Movies and television shows are full of scenes where individuals are recognized in huge crowds using facial recognition software. Until recently, some of those seemed far-fetched or maybe prohibitively expensive. That is no longer the case. Sahil Chinoy described a facial recognition demonstration in The New York Times. He and his team built a sub-100 […]