When the term DevOps was first seen on the horizon of enterprise IT in 2009, it was largely questioned how enterprise IT security teams could keep up with such environments.
Recent Posts From All Categories
In a recent post we covered the potential problem of workers and managers at organizations becoming increasing disengaged from information security efforts as major data breaches become more common occurrences and take on an air of inevitability.
Recently the U.S. government added a tool to the toolset it can use against those who attack US-based systems and data.
Perhaps the poor users have been maligned for all these years after all. Security pundits have long decried enterprise and consumer users' tendency to clickety-click their way right through important security warning screens without ever paying heed to the content of the warning. It's a propensity that leaves their machines vulnerable to misconfigurations, makes them easy targets for dangerous attacks that still require user input to download malicious content and otherwise clears the path for all nature of endpoint-oriented social engineering.