Bruce Schneier breaks down why traditionally encryption may be in trouble once quantum computing becomes a reality, and what security researchers are doing to keep things locked down.
As a long time Have I Been Pwned fan, I like to keep up with what Troy Hunt is saying about security. In this post, he makes the argument that publicly shaming bad corporate security is a net positive. This kind of direct public pressure, either from journalists, security researchers, or anyone with social reach, […]
With Cisco Live US happening this week in Orlando, we decided to share a throwback episode featuring Rob Rodgers and Mils Swart of Skyport Systems. Skyport was recently acquired by Cisco in February. It’ll be interesting to see how Cisco uses this talent to address the security concerns raised in this episode.
Managing access control lists on firewalls is a time consuming affair that often leads to significant frustration. There needs to be an easy way of making sure that these constructs are successfully maintained. Tom Hollingsworth looks at a new SolarWinds tool from Tech Field Day 16 and how Network Insight for Cisco ASA has features to help you control your access lists.
Gmail doesn’t distinguish if you put extra dots in your email. Netflix does. Oh, not a problem you say? Bruce Schneier shows how two mundane data practices can come together to create a security exploit.
In this edition of Gestalt News:
– We talk to Jordan Martin and get his IT Origin story
– Our First Five series tackles Simple Security
– The On-Premise IT Roundtable discuss the language that most pains them in IT.
Do you have full confidence in your security monitoring solution? It would appear that no one does based on a recent report. But ExtraHop is hoping to change that with a new product called Reveal(x) that combines their award-winning network monitoring solutions with a security focus to help you decipher what your infrastructure may be hiding.
Where do you start when a tech topic gets too deep? First Five! Our new series takes a step back and introduces a new tech topic with five things you want to know. It’s your quick and easy fix to understand the technological fundamentals all around us. For our debut, First Five breaks down the Cloud.
I had the privilege to talk to Jack Daniel about how he gradually made the transition from auto mechanic to IT, and then later entered the security community. We had a great conversation, ranging from the danger of absolutism in IT, the structure of various security communities, to what’s a cool drink to get at a bar.
The EU GDPR data privacy regulation is set to go live later this year. What is GDPR? What makes it so special for the protection of personal data? What do you need to know to get compliant before it’s too late? Tom Hollingsworth walks you through the pieces to help make sense of this landmark regulation.