Friday Squid Blogging: Fried Squid Recipe

Posted on April 6th, 2019 by Responsible Cyber

This is an easy fried squid recipe with saffron and agrodolce. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: squid Go to Source Author: Bruce Schneier

Read More

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History

Posted on March 30th, 2019 by Responsible Cyber

It is traveling to Paris. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: squid Go to Source Author: Bruce Schneier

Read More

F5 Networks Acquires NGINX For $670 Million

Posted on March 14th, 2019 by Responsible Cyber

One of the most important software companies NGINX, which is also behind the very popular open-source web server of the same name, is being acquired by its rival, F5 Networks, in a deal valued at about $670 million.While NGINX is not a name that you have ever heard of, the reality is that you use […]

Read More

What is quantum cryptography? It’s no silver bullet, but could improve security

Posted on March 14th, 2019 by Responsible Cyber

Quantum cryptography definition Quantum cryptography, also called quantum encryption, applies principles of quantum mechanics to encrypt messages in a way that it is never read by anyone outside of the intended recipient. It takes advantage of quantum’s multiple states, coupled with its “no change theory,” which means it cannot be unknowingly interrupted.  Performing these tasks […]

Read More

Friday Squid Blogging: Squid Proteins Can Be an Alternative to Plastic

Posted on March 14th, 2019 by Responsible Cyber

Is there anything squids aren’t good for? Academic paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: academic papers, squid Go to Source Author: Bruce Schneier

Read More

What is ethical hacking? How to get paid to break into computers

Posted on March 1st, 2019 by Responsible Cyber

What is ethical hacking? Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization’s defenses. It’s among the most exciting IT jobs any person can be involved in. You are literally getting paid to keep up with the latest technology and get to break into […]

Read More

Friday Squid Blogging: Sharp-Eared Enope Squid

Posted on February 20th, 2019 by Responsible Cyber

Beautiful photo of a three-inch-long squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: squid Go to Source Author: Bruce Schneier

Read More

Enabling Robust Security with Intent-based Segmentation

Posted on February 6th, 2019 by Responsible Cyber

Most networks, despite all of their digital connectedness, are not only flat, but are also built around an “Implicit Trust” philosophy. Because of this, once the perimeter has been breached an attacker is able to gain access to the entire network. This allows full freedom of lateral network movement for intruders to find and compromise […]

Read More

Mitigating the Security Risks of Cloud-Native Applications

Posted on February 6th, 2019 by Responsible Cyber

While containers can create more secure application development environments, they also introduce new security challenges that affect security and compliance. Containers represent the most significant computing advancements for enterprise IT since VMware introduced its first virtualization product, Workstation 1.0, in 1999. They enable organizations to build, ship, and run applications faster than ever, fueling the […]

Read More

Creating a Security Culture & Solving the Human Problem

Posted on January 30th, 2019 by Responsible Cyber

People are the biggest weakness to security breaches; people can also be your organization’s biggest defense. Through nearly a dozen years of experience at the FBI and now at Qualtrics, I’ve seen that many of the most successful hackers no longer first look for software vulnerabilities. They’re coming after your people. The reason is simple: […]

Read More