Beware the (Online) Game
okt 7, 2019
Playing online games does not really sound like much of a security risk. Whether it is a first-person shooter game, a game where one hunts mythical creatures, an MMORPG, or some sort of simulation, the security concerns often appear minimal. There are two major problems with that idea. The first big issue is that gamers […]
Your #CyberAware Checklist
okt 3, 2019
In celebration of Cyber Security Awareness Month, we’re bringing you this checklist to make sure you stay #CyberAware not only in October but all year long. ✔ Update your passwords. According to National Institute for Standards and Technology (NIST) guidance, you should consider using the longest password or passphrase permissible. Be sure to customize your passwords […]
QUIZ: Does your Organization Cultivate an Enterprise-Wide Culture of Cyber Security Responsibility?
okt 2, 2019
From customer-facing employees, to the IT team, to the C-Suite, cyber security is everyone’s responsibility. Answer the questions below to find out how prepared your workforce is to defend against today’s cyber threats.
Practical Steps Toward Compliance With OpenSCAP
aug 28, 2019
In this blog I described some of the logical problems with vulnerability scanners. False positive and false negative errors. Additionally, the worry that problems exist but our tool hasn’t even tried looking for them. Let’s try to make this practical! I’m working on a consulting job as a sub-sub-contractor on a U.S. Department of Defense […]
What Is a GAN And Is It Dangerous?
aug 20, 2019
I enjoy being deceived sometimes. The magicians Penn and Teller do a great job of deceiving audiences. The website https://www.thispersondoesnotexist.com/ demonstrates a different kind of deception: computer-generated images that look incredibly realistic. This is different than the deepfake videos where one person’s face is attached to another’s body. The method the site uses is called […]