What can March Madness and 538 teach us about cybersecurity risk?

Read Time:53 Second

I love this time of year, with March Madness excitement in the air and my Notre Dame Fighting Irish still in the tournament (as of the writing of this column)! More importantly – yes, more importantly – I love monitoring the 538 March Madness prediction website to see how the chances of winning change through the days, after games, and even within their 40 minutes of activity.

I like doing this because it is a better representation of how cybersecurity risk works than the way we typically think in our field. So, we can watch – even in real-time – how the chances of success (winning the game, moving on to the next round) and failure (losing) change with the variables during the game and the context outside of them (other games). As I watch those probabilities change – sometimes swinging wildly — I think of how cybersecurity-related risk changes in a similar manner, with the real-time activity in our computing environments – sessions, messages, transactions, flows, etc. — being established or sent.

To read this article in full, please click here

Read More

5 old social engineering tricks employees still fall for, and 4 new gotchas

Read Time:42 Second

Blame it on pandemic fatigue, remote work or just too much information, but employees appear to be lowering their guard when it comes to detecting social engineering tricks. Attackers were more successful with their social engineering schemes last year than they were a year earlier, according to Proofpoint. More than 80% of organizations suffered a successful email-based phishing attack in 2021, according to a survey of 3,500 professionals. That’s a 46% jump from 2020.

“So many people, especially today with all the distractions and noise of the world, are on autopilot – just going through the motions,” says Kevin Beaver, principal consultant at security firm Principle Logic. “Their subconscious mind has taken over making what are often critical decisions. The bad guys know they have the upper hand.”

To read this article in full, please click here

Read More

seamonkey-2.53.11.1-1.el7

Read Time:24 Second

FEDORA-EPEL-2022-d5db33b633

Packages in this update:

seamonkey-2.53.11.1-1.el7

Update description:

Update to 2.53.11.1

Note that since 2.53.11, besides the ordinary builds for the current Fedora and EPEL branches, there is an additional distro-independed build available at https://buc.fedorapeople.org/seamonkey .
So if you have friends who use other Linux distro, but that distro does not provide SeaMonkey yet, you can recommend this build for them.

Read More

seamonkey-2.53.11.1-1.el8

Read Time:24 Second

FEDORA-EPEL-2022-eb750aaec6

Packages in this update:

seamonkey-2.53.11.1-1.el8

Update description:

Update to 2.53.11.1

Note that since 2.53.11, besides the ordinary builds for the current Fedora and EPEL branches, there is an additional distro-independed build available at https://buc.fedorapeople.org/seamonkey .
So if you have friends who use other Linux distro, but that distro does not provide SeaMonkey yet, you can recommend this build for them.

Read More

News, Advisories and much more

Exit mobile version