General

The case for insider-threat detection

An independent threat intelligence team warned the Treasury Department that representatives of the Department of Government Efficiency was by an independent threat intelligence were a significant “insider threat.” The warning made the problem of insider threats a new worry for US citizens, sparking multiple discussions on social media. It also made a new case for technology that defended against the threat.

Insider threats are not the most common form security weakness, but they are the hardest to defend against. Even if a company is successful in screening out potential bad actors in the hiring process, then they have to. make sure who they hired is who shows up to get their security badge. And if they get past those two processes, there’s always the possibility of an unbalanced or angry employee bringing a firearm into the office to commit mayhem. Luckily there are technologies in place, such as advanced detection and response, identification validation and AI driven weapons detection available in the market.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...

Privilege abuse threatens IoT networks lacking integrated and automated access management

With the Internet of Things (IoT) expected to reach 55.7 billion devices next year, the scale and complexity of cyber threats have grown at an alarming rate. Many of these environments rely on outdated operational technology (OT) and devices with minimal defenses, making them highly vulnerable to attack and infiltration.

Free Membership Required

You must be a Free member to access this content.

Join Now

Already a member? Log in here
Read more...

How social media moderation works

There has been a lot of debate regarding the imposition of moderation on social media and whether that constitutes censorship and violations of the right to free speech. That argument is specious at best. Offending content on commercial social media is removed only when it negates profitability.

Most humans moderate their speech. Sometimes we think about impulsively speaking in reaction to something that incites strong emotions. People who do not react have what is called, “self-control”. Some people don’t have that filter (I’m looking at you, Elon) and blurt out offensive, nonfactual, or dishonest responses. Sometimes they aren’t atypical, they are just selfish people without manners (still looking at you Elon). Moderation of your speech is just a civilized attitude.

Profit motive

When it comes to social media, however, especially for-profit social media, the primary factor is profit. That has been the guiding principle of all social media moderation.

Read more...

Editorial: Jog on, Meta

Mark Zuckerberg made two announcements about major changes in Meta in the past two weeks. The first was the revelation that they would be creating hundreds of AI-driven bots to interact with users. The second was the announcement that they would stop moderation of content, “except for dangerous stuff,” according to a video posted by Zuckerberg. With a certain amount of schadenfreude, we note that Meta had to pull the accounts they had already made as users started engaging with them, finding their inherent flaws and raking them over the coals for how piss-poor their execution was.

Both of these announcements validated a decision I had made earlier this year to start divesting myself of Meta platform accounts. I made the request to deactivate all the accounts (Facebook, Instagram and Messenger) a week before both announcements. I would have done it sooner if I had known it would take Meta 30 days from my request to deactivate everything. This morning, however, I received a text from my partners in Cyber Protection Magazine asking if I thought we should deactivate our Facebook account.

Frankly, I had forgotten we had one, basically because we received zero engagement from the platform, despite the amount of content we put up there. That,.too, is a result of Meta de-emphasizing legacy media. Of course, I concurred with the team. Sometime in February, we will disappear from Facebook.

Read more...

Federal WIDS Compliance: Why Single-Sensor Wireless Detectors Fail

Handheld devices are inherently limited in range and sensitivity. Their compact size and basic receiver capabilities make them impractical for covering large or complex environments like military bases, office buildings, or airports. Effective WIDS solutions require continuous, widespread monitoring through strategically deployed fixed sensors that offer broader sensitivity and coverage.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...