MartinZ Blog - MartinZ.net

Martin Zinaich
MartinZ.net
MartinZ.net
Go to content

How Vendors Empower Weak Security

I wrote about this before in a post called “Big Things and Small Things”. I documented how two very large companies failed to support Information Security in a corporate environment with even a basic level of accommodation. More came to light this week when reviewing Microsoft Exchange 2016...
Martin Zinaich | 6/2/2017

2017 InfoSec Predictions

As usual, we have the requisite Information Security Predictions for the coming New Year:

Jeff Harris, vice president of solutions for Ixiamp, sees a ramp up in weaponization of the Internet of Things (IoT) to carry out widescale DDoS attacks in 2017

James Carder, CISO of LogRhythm, predicts that in 2017 we could be in for a total shut down of the Internet for up to 24 hours

Lamar Bailey, senior director of security R&D at Tripwire, believes 2017 will see the return of the worm with IoT devices

Bruce Snel of McAfee sees IoT malware opening a backdoor into homes
Martin Zinaich | 4/1/2017

Fast Incident Response Expected

From time to time, I like to compare and contrast the nascent Information Security profession with more traditional and established occupations. For example when I had lunch with a police officer friend and gave it some food for thought.
Martin Zinaich | 7/10/2016

Hack the Vote!

As recent events with the Democratic National Committee (DNC) being hacked solidify the fact that we cannot seem to secure anything connected to the Internet, one has to wonder if elections can also be hacked. The topic of “Hacking the Vote” reminds me of one of my favorite InfoSec security maxims; “high technology is often taken as a license to stop thinking critically”.
Martin Zinaich | 13/8/2016

Falling into the Windows 10 PIT again

In the past, I wrote about Microsoft’s “Asimov” and how it appeared to be running on my Windows 7 machine. I was not participating in the Microsoft Customer Experience Improvement Program but a KB was loaded and producing errors related to that program. I describe such applications as Privacy Invading Technology (PIT).
Martin Zinaich | 17/7/2016
Copyright (c) 2024 Martin Zinaich
All Right Reserved
ABOUT
Official Site of Martin Zinaich
Disclaimer
All views expressed on this site are my own and do not represent the opinions of any entity whatsoever with which I have been, am now, or will be affiliated.
Disclaimer
All views expressed on this site are my own and do not represent the opinions of any entity whatsoever with which I have been, am now, or will be affiliated.
Back to content