We are always insisting that our clients always use multi-factor authentication (MFA) for absolutely every service they use. It is a prerequisite of any client we manage Microsoft 365 for that MFA is activated and enforced for everyone of their users. However, of course, there are ways that hackers exploit …
Security Theatre
Security Theatre – is a term I first heard at Napier during the lectures and now I know where it came from, Bruce Schneier. I use the term all the time when discussing cyber security with clients, trying to move them from theatre to real cyber security. One example, putting …
Because It’s Friday – a sharp James Webb space telescope and a little extra about passwords
Just before we get to the James Webb space telescope. I prepare these Friday offerings during the week as I see something interesting. Once posted on a Friday, it is inevitable I then see something else, on Friday afternoon – which was the case with the James Webb initial alignment …
Weak cryptographic keys in the wild – UPDATED
This post was originally published on 15 March 2022 Researcher, Hanno Böck, has found very weak cryptographic keys in use that have been generated by SafeZone Crypto Libraries, once owned by Inside Secure and now owned by Rambus. These keys are so weak that consumer grade hardware running old algorithms. …
Continue reading “Weak cryptographic keys in the wild – UPDATED”
New US law to force critical companies to reveal when they have been breached
This story has been doing the rounds for the past few weeks, as the US Government goes about creating a law to make companies, that form part of the critical infrastructure, declare publicly when they have been hacked. US Critical Infrastructure Companies Will Have to Report When They Are Hacked …
Continue reading “New US law to force critical companies to reveal when they have been breached”