social.sokoll.com

Search

Items tagged with: Infosec

OMG. Just… no.

#InternetOfShit #IoT #TroyHunt #Security #InfoSec #RemoteControlDetonator
 
OMG. Just… no.

#InternetOfShit #IoT #TroyHunt #Security #InfoSec #RemoteControlDetonator
 
 

I bet it's certified.

 
 
 

I asked myself that question for at least 30 years ;-)


reshare from @micha@pluspora.com

Tweet von Steffen Christensen (@Wikisteff) um 26. Aug., 04:48 Holy shit.
You can pronounce #hex numbers, people!

#hexadecimal #math
/c @hexadecim8 #Infosec #devops https://t.co/HtDmvXD9Pr

https://twitter.com/Wikisteff/status/1165818361097392128
 
Tweet von Steffen Christensen (@Wikisteff) um 26. Aug., 04:48 Holy shit.
You can pronounce #hex numbers, people!
#hexadecimal #math
/c @hexadecim8 #Infosec #devops https://t.co/HtDmvXD9Pr

https://twitter.com/Wikisteff/status/1165818361097392128

Twitter: Liz Henry on Twitter (Liz Henry)

 
Tweet von Steffen Christensen (@Wikisteff) um 26. Aug., 04:48 Holy shit.
You can pronounce #hex numbers, people!
#hexadecimal #math
/c @hexadecim8 #Infosec #devops https://t.co/HtDmvXD9Pr

https://twitter.com/Wikisteff/status/1165818361097392128

Twitter: Liz Henry on Twitter (Liz Henry)

 
Hey, quick #infosec shot:

There's no perimeter anymore, users still want to access internal ressources, from all over the place: web services, PIM, proprietary applications, from all over the place, and probably even w/o an installed VPN client or from completely unmanaged machines. What would you look at?

Bonus points for 2/MFA, SSO, and authorisation by who and from where the access originates.
 
Hey, quick #infosec shot:

There's no perimeter anymore, users still want to access internal ressources, from all over the place: web services, PIM, proprietary applications, from all over the place, and probably even w/o an installed VPN client or from completely unmanaged machines. What would you look at?

Bonus points for 2/MFA, SSO, and authorisation by who and from where the access originates.
 
Later posts Earlier posts