🔗 Risk Based Prioritization
Risk Based Prioritization This guide serves as a crucial companion for cybersecurity professionals, offering an in-depth understanding of how to effectively prioritize vulnerabilities in the digital landscape.
Risk Based Prioritization This guide serves as a crucial companion for cybersecurity professionals, offering an in-depth understanding of how to effectively prioritize vulnerabilities in the digital landscape.
Increasing levels of sharing access for files in Google Drive (source) Always remember these three guiding principles when choosing your share settings: Share with the fewest people and lowest level of access and permission as the work allows. Be aware of searchable settings that may unintentionally share the file with others. If no longer needed, reduce sharing permissions or delete files. Combining these principles with an understanding of Stanford’s risk classifications will help you make the best sharing choices....
Unable to display PDF file. Download View | Source This talk is about user enumeration, its impacts, and why Microsoft should take it seriously. Everything demonstrated is by design. Microsoft has decided that user enumeration does not qualify as a vulnerability. What is User Enumeration? Enables an attacker to identify VALID accounts, and INVALID accounts based on server response Examples: Verbose login response - “Your username is invalid” Time-based login response...
http://weakpasswords.net 100~ common passwords based on last 90 days, updated daily
A real story of how following good security practices is both easier to do than ad-hoc methods, and it spreads quickly to others.
#GamerGate [Online] Survival Guide | Jon Jones, smArtist Here is a quick, streamlined guide on how to keep yourself safe online and make harassing you and tracking you down much more difficult. Two-factor authentication on everything. Password manager for unique, difficult passwords. Install PrivacyFix. Lock down old Facebook posts and adjust your privacy settings. Domain name whois guard. Delete old accounts. Check the internet for your personal information. Use a VPN....
Over the course of a year, I researched and created ZXX , a disruptive typeface which takes its name from the Library of Congress’ listing of three-letter codes denoting which language a book is written in. Code “ZXX” is used when there is: “No linguistic content; Not applicable.” (via Making Democracy Legible: A Defiant Typeface — The Gradient — Walker Art Center )
masteradept: FYI – from Sgt. Mad Dog Tracy – As the Chalk Leader for my flight home from Afghanistan, I witnessed the following: When we were on our way back from Afghanistan, we flew out of Baghram Air Field. We went through customs at BAF, full body scanners (no groping), had all of our bags searched, the whole nine yards. Our first stop was Shannon, Ireland to refuel. After that, we had to stop at Indianapolis, Indiana to drop off about 100 folks from the Indiana National Guard....