Is „Encrypt Everything“ Really the Only Solution?

When I look at the recent events and data exfiltration cases, it really looks like we are at the losing end of a battle. It seems to be fairly simple to compromise a network and exfiltrate data nowadays. Now you may claim that you deployed all kinds of cool technology like hardened clients, data loss…

Police develop MAC-sniffing software to track stolen devices

Is there still somebody saying that the police is not innovative? Clever idea (if you know the MAC address of your stolen phone): Police develop MAC-sniffing software to track stolen devices Roger Related articles US policeman goes war-driving to find stolen kit by MAC address (go.theregister.com) Cops Wardriving To Find MACs Of Stolen Gear (packetstormsecurity.com)…

Leveraging EMET to Win Time to Patch – an Underestimated Jewel

There is a jewel in a security professional’s toolbox, which – in my opinion – is highly underused. At least this is true in infrastructures I know. Since years, Microsoft offers a free tool called EMET (Enhanced Mitigation Experience Toolkit). EMET helps you to leverage the security technology built into Windows. To quote the above…