Russia Suspected in Truss Phone Hacking Scandal
One year’s worth of messages reportedly downloaded from former PM’s device
Cyber News, Cyber Threat TrendsOne year’s worth of messages reportedly downloaded from former PM’s device
Cyber News, Cyber Threat TrendsDoes your company have a travel policy that instructs and supports employees traveling internationally for business with direction regarding comportment and cooperation? This isn’t a trick question. To have a travel program that provides employees with anticipated scenarios, and to provide them with unique devices for international travel, is a significant investment of resources both […]
Cyber News, Cyber Threat TrendsWayne Bridgeman II, a Senior Manager on AT&T’s Network Cybersecurity team, offers a 5-point checklist for businesses in 2022 alongside tidbits of often overlooked tactics that can strengthen security. Wayne Bridgeman II is no stranger to the fighting ring. He fought professionally in the martial arts community for 5 years and has since transitioned to helping […]
Cyber News, Cyber Threat TrendsPersonal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect your device like a royal family fortifying a medieval castle. Unlike medieval castles that depended upon layers and layers of protection (moats, drawbridges, spiky gates, etc.), personal devices thrive on just one defense: a devoted guard called antivirus software. Increasing your personal device’s […]
Cyber News, Cyber Threat TrendsTelling me I have an invalid policy document with no further information is not helpful — and the errors in this post seem like they would be easy to pass through I was just getting some errors with a policy document for a VPC Endpoint. The error messages are simply this: InvalidPolicyDocument (Service: AmazonEC2; Status Code: 400; Error Code: […]
Cyber News, Cyber Threat TrendsACM.96 Gotchas when trying to create zero-trust policies and then later deleting and recreating the policies This is a continuation of my series of posts on Automating Cybersecurity Metrics. Dependencies between CloudFormation stacks What happened when I tried to delete some stacks is that I could not delete them because other CloudFormation stacks reference that stack. […]
Cyber News, Cyber Threat TrendsACM.95 Creating a script to delete a stack of resources so you can redeploy from scratch This is a continuation of my series on Automating Cybersecurity Metrics. Deleting stacks might not be as easy as you think! As I explained in the last post, my resources got into a mangled state in CloudFormation I couldn’t fix […]
Cyber News, Cyber Threat TrendsSeldomly seen but nice to have Continue reading on The CISO Den »
Cyber News, Cyber Threat TrendsWe’ve said it before/And we’ll say it again/It’s not *if* you should patch/It’s a matter of *when*. (Hint: now!)
Cyber News, Cyber Threat Trends