Not long ago, I was reading a debate on a Linkedin.com forum discussing all kinds of edge cases that some participants were arguing needed to be considered in a security policy regarding some particular aspect of security. In fact, I forget what the issue was, but it was clear that… Continue reading
Search this site
Check out my other project…
- Create an EC2 that runs Chrome for sandboxed websurfing
- Check Multiple AWS S3 Buckets for Missing Default Encryption
- The Equifax Data Breach and the Apache Struts Vulnerability
- Test Early, Test Often
- Linux Hardening
- Information Security at Startup Companies
- Timestamp bash_history with every command
- Has SHA-1 been hacked?
TweetsLoad More...Jane Slater@SlaterNFL
An Ex Boyfriend once got me a Fitbit for Christmas. I loved it. We synched up, motivated each other... didn’t hate it until he was unaccounted for at 4am and his physical activity levels were spiking on the app 🥴wish the story wasn’t real. https://twitter.com/albertbreer/status/1202326675012362240
Hello world! fwd:cloudsec is a new cloud security conference taking place in Houston on June 29, 2020. We're interested in all clouds, attack and defense, and more. We want to talk about the stuff that the vendor conferences don't.
Read more at https://fwdcloudsec.org/
I will be ery interesting to look into the forensic implications of this new capability: https://aws.amazon.com/blogs/aws/new-programmatic-access-to-ebs-snapshot-content/