Cloud Eats Security
Shutterstock

Cloud Eats Security

Over the past 20 years, cybersecurity has persistently played an unwinnable game.  In this game, the attacker makes all the rules, sets all the timers, records all the scores, and can walk away from the game anytime without losing anything. Meanwhile, the defenders are encumbered with a cavalcade of rules, tools, and fools: insidious compliance…

READ MORE
1892 wooden ballot box

Iowa caucuses and the Shadow app: A lesson in critical infrastructure

On Monday 3 February 2020, Iowans caucused at almost 1700 precincts across the state to select their preferences among presidential candidates.  Three days after the Iowa caucuses, the final tallies for the Democratic presidential candidates remained incomplete.  The popular press blames a technical glitch in the Shadow app, but accountability resides with party leaders and…

READ MORE
Formjacking

Formjacking: What’s That?

Answer these questions? Has your site been infected with formjacking? How did you find out? How hard was it to repair? How much damage did you or your users sustain? Symantec Internet Security Threat Report describes formjacking as malicious code inserted into websites. To capture personally identifiable information (PII) and debit/credit card information. Compromised sites…

READ MORE