The question a wise security manager asks is, can it be done, outside of a James Bond or Mission Impossible scenario? Is it possible to hack a satellite? If you mean use the satellite for your own signals, the answer[…]
Archive: September 2016
2016
25
Sep
17
Sep
Five Questions to Ask When You’ve Been Compromised 1. Which systems and data were affected? 2. How did they do it? 3 . Who did this to us? 4. Is it really over? 5. Can it happen again? Modern security[…]
15
Sep
Anyone who has even the slightest amount of contact with the internet is familiar with the scenario: An email or actual piece of mail arrives from a company who apparently handles some part of your connected life. The letter calmly[…]
End
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|