Whilst researching for yesterday’s installment of the Insider Threat series, that I am writing over on our online training site CyberAwake, I read an article by Bret Arsenault, from Microsoft that opened with this quote: The amount of data captured, copied, and consumed is expected to grow to more than …
CISA adds two vulnerabilities to the Known Exploited Vulnerabilities Catalog
The release says one vulnerability, but if you check there are two, for Microsoft and Fortinet. CISA Has Added One Known Exploited Vulnerability to Catalog | CISA
Yesterday was Patch Tuesday for Microsoft
So, everyone knows what that means, for the users, slow internet connections as we all gather in those vital updates, for the administrators, checking what needs to be done and checking that it has happened – including checking that the users have not skipped the updates because they are too …
Continue reading “Yesterday was Patch Tuesday for Microsoft”
A series on the Insider Threat – and your first tip on dealing with it!
Recently I have covered a couple of incidents that revolve around a betrayal of trust – often called the insider threat: The Insider Threat – it may be at the top of the company… – Smart Thinking Solutions The Insider Threat and $250,000 – Smart Thinking Solutions This got me …
Continue reading “A series on the Insider Threat – and your first tip on dealing with it!”
Were you a lab rat?
Here is an interesting article about privacy, looking at how LinkedIn (Microsoft) loosely interpreted its privacy policies so it could experiment on twenty million users: Experts debate the ethics of LinkedIn’s algorithm experiments on 20M users | Ars Technica