|Analysis: Will Your Security Infrastructure Be Determined By Your Cyberinsurance?|
Your infrastructure choices could be limited to vendors and products that the insurance industry deems worthwhile.
|Has RPKI Usage For Internet Routing Picked Up?|
Have network owners started to use RPKI to secure the IP addresses and routing status on the Internet ?
|Is Security A Feature Or A Product?|
I would be cautious about a vendor who sells security as a product or a critical/primary feature. Security-as-a-product is coming to an end. We need to return to making the things we already have work efficiently.
|Mitigate Supply-Chain Attacks With Microsegmentation And ZTNA|
Security controls such as microsegmentation and zero-trust network access provide the best opportunity for stanching the spread of supply chain attacks and limiting their blast radius.
|Paying The Ransom Has Problems, Too|
Paying the bad guys their ransom demand to get a key and decrypt your data might seem like the fastest way to recover from a nasty hack. But is it?
|Quick Take: Anti-Tracking in Web Browsers|
What is the strategy behind anti-tracking from Firefox and Webkit
|Reading: The Case for a Mostly Open Internet|
Background material on the internet policy as countries control open access
|Setting Up Public-Private Keys For SSH Authentication|
How to create an RSA public-private key pair and configure clients and servers to use them for authenticating to remote hosts over SSH.
|The Demise of Extended Validation Certificates|
Another abject failure by public CAs
|Tracking Prevention Policy And Corporate Privacy|
Is user surveillance by Google/Facebook a corporate security risk ?
|Video: Alex Stamos, Bluehat Keynote|
This keynote gave me new ideas on cybersecurity.
|WHITEPAPERS & EBOOKS||Summary||Author|