How are thought leaders and software providers working here in mid-2018 to jump ahead of the bad actors in the race to protect personal and business data?
Brian, this cryptomining knowledge has to be spreading quickly among hackers. But don't a lot of hackers just keep doing the same old tricks they have been doing? How adventurous are they, generally?
A5: The proliferation of HTTPS encryption is creating almost as many problems as it solves because new-gen security tools still struggle with high-performance real-time encryption. #eweekchat
@TechJournalist a5 - i’m still …concerned about weaponization of meltdown/spectre attacks (Intel CPU flaws). Very difficult to detect, patching has been hard..so when/if real world attacks emerge…could be…trouble.
@techjournalist to @editingwhiz A3) - LACK of updates /plenty of weaknesses (ranging from lack of encryption, to default password use) make IoT an attractive target/ in terms of protections…network based stuff (where traffic is filtered via DS) can be a real help
From Sean Michael Kerner @techjournalist: Replying to @editingwhiz a4 - The basic idea behind a ‘sandbox’ is to isolate running processes/ from the rest of a system. Makes a lot of sense and is a common practice across the best tools i know.. #eWEEKchat
We are definitely not seeing everybody on this CrowdChat channel ... I am seeing several others on the Twitterfeed only ... go to https://crowdchat.ne... for live chat. thanks