Author: Mike

Two-Factor Authentication: Still Better With Than Without It

Google has published the results of a study of the efficacy of standard anti-account-hijacking techniques like two-factor authentication (2FA), secret questions, and passwords: the good news is that when these are used, they are incredibly effective at stopping both automated and targeted…

Free Stuff: Nessus Essentials

COLUMBIA, Md., May 15, 2019 (GLOBE NEWSWIRE) — Tenable®, Inc., the Cyber Exposure company, today announced Nessus® Essentials, an enhanced free version of its market-defining vulnerability assessment solution (formerly Nessus Home). Nessus Essentials is designed to be used by students, professors…

Breaches Forever!

The computer security industry is not stopping breaches. Not for lack of trying, but if you’re familiar with the myth of Sisyphus, such efforts are the definition of pointless. If this sounds strange coming from a computer security person, it…

The Equifax Breach is Not Special

The hue and cry over the Equifax hack has subsided to a dull roar. We’ve passed the stage of ‘initial reports,’ which are usually wrong, and are firmly in armchair cybersecurity pundit mode. ‘What did Equifax executives know and when…

C.R.E.A.M. IoT Edition

We can go round and round about what’s going to drive improvements in computer security writ large, but when you boil it down it’s really only about one of and/or two things: money and bodies.