Our Continuously Connected Lives: Benefits and Risks
The Internet of Things (or IoT) is already here. As I described last week, it has already been misused to launch the largest DDoS (or Distributed Denial of Service) attack in history. Attacks against cyber security writer Brian Krebs and a French Internet service provider moved the record flood rate from 363 Gbps to 620 […]
What Happens When “Shadow IT” Goes Missing?
Last week I told about how a vulnerable cloud server was deployed, ignored, and then owned by an attacker, with Amazon catching this and the entire cycle complete in just over two weeks. It had an obvious cause: skipping part of the process in which unneeded cloud resources are shut down. But I said that […]
What Is Computer Security?
What is “computer security”? When Adrian Bryan and I set out to write our Introduction to System and Network Security course for Learning Tree some years ago, we needed to start with a definition. It served as a sort of goal or guiding light in writing the course materials. The definition is from Simson Garfinkel […]