cybersecurity
-
Access Controls
Discretionary Access Control (DAC) – A certain amount of access control is left to the discretion of the object’s owner, or anyone else who is authorized to control the object’s access. The owner can determine who should have access rights to an object and what those rights should be. Mandatory Access Control (MAC) – Access
-
Risk Treatment
Risk Treatment is making decisions about the best actions to take regarding the identified and prioritized risk. There are four types outlined below: I’m posting this because it is a concept that I have in the past been confused on. For example, mitigation and transference can be confused in the following way. If someone buys
-
Books about cybercrime
A guardian article was recently published covering the top 10 cybercrime books. What they didn’t do is rank them with any third-party data. Below I’m putting those 10 books plus another with their goodreads rankings (0-5 being the best), to help me, and maybe you, choose the right book to start reading first. Book Rating
-
Cybersecurity Articles | Week of October 24, 2022
TechCrunch, Inside TheTruthSpy, the Stalkerware network spying on thousands by Zach Whittaker (Oct 26) | A database containing about 360,000 unique android devices exposed. TechCrunch, Hive Ransomware gang leaks data stolen during Tata Power cyberattack by Carly Page, Jagmeet Singh (Oct 25) | Tata Power, which serves more than 12 million customers through its distributors,
-
Great Recent Articles
Nature: Why scientists are turning to Rust by Jeffrey M. Perkel (Dec 11, 2020) Why this is interesting. RUST is seen as more secure than other older programming languages. The Trade Secrets Network: Struggles with Insider Risk Program Stakeholders by Stacey Champagne (Sep 9) Bleeping Computer: Web browser app mode can be abused to make
-
Verizon Data Breach Reports
Full disclosure I work for Verizon. Regardless of that fact, these are information packed reports that I found fascinating. All reports – list of cool stuff to browse through. Data Breach Investigations Report (DBIR) – THE report that analyzes the threat landscape. It tells the story of what is happening with data breaches across industries.
-
Star Trek & Cybersecurity
These two things together. Take my money! Hacker’s Movie Guide: The Complete List of Hacker and Cybersecurity Movies by Steven C. Morgan, Connor S. Morgan
-
Insider Threats: Building a repository of past incidents
This came up when it was mentioned to me a data dictionary for insider threats. Coming from data governance I had only considered these being about databases, tables and columns, when this was more about building a library of information around past incidents so that information can be used to help with insider threats in
-
Homomorphic Encryption
This is the best video I could find on the subject and I’m still not sure I really get it. But it seems complicated so I don’t feel that bad. I’ll post more as I learn more.
-
Hacking Google
Watch 6 amazingly well produced youtube videos about cybersecurity and how Google does cybersecurity. Absolutely fascinating and worth the time! Loved this series and wish there was more! Playlist link.
