
How a barcode scanner helped fix CrowdStrike mess in a flash

Mostly, they seek out vulnerabilities, detect attacks, and eliminate compromises. Of course, the size of the attack surface and the sheer volume of vulnerabilities, attacks, and compromises means organizations must make tough choices; not everything gets fixed, stopped, recovered, and so forth. There will need to be some form of acceptable (tolerab
... See moreStuart McClure • How to Measure Anything in Cybersecurity Risk
JENA MARIE ESPELITA • TRUSTING A TRUSTLESS NETWORK. The Paradoxes of Trust in Blockchain Technology
Amanda Chicago Lewis • Secrets of a ransomware negotiator
Practically all color printers leave a unique fingerprint on their output: they print nearly invisible, light yellow dots on every page. These dots give the time of the printing and the printer's unique identifier. In other words, if you print out controversial opinions, you could, in principle, be traced.
Mikko Hyppönen • If It's Smart, It's Vulnerable
Recording the maintenance history of critical pieces of medical equipment, for example, an MRI scanner, providing a permanent audit trail.
William Mougayar • The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology
What once required big outlays of cash and days of work can now be done in minutes without buying any hardware or hiring any technicians.