Content

Kelly Martin: Regaining control

Share

“Securing endpoint systems by locking them down using complex software brings back memories of another era, where business computers were once used for business applications only – and businesses retained control over their assets and data.”

This is an excellent article that talks about how businesses should go back to basics and make their corporate PCs more corporate and less personal. From restricting which software is installed, to filling USB ports with glue. No one is really safe (even when you do use Firefox), and for businesses, the focus should be business, not listening to music or fancy screensavers.
It may sound too extreme for some organizations, but then again, what are you willing to put at risk?

Full Article

.com

Paul Asadoorian

Paul Asadoorian is currently the Principal Security Evangelist for Eclypsium, focused on firmware and supply chain security awareness. Paul’s passion for firmware security extends back many years to the WRT54G hacking days and reverse engineering firmware on IoT devices for fun. Paul and his long-time podcast co-host Larry Pesce co-authored the book “WRTG54G Ultimate Hacking” in 2007, which fueled the firmware hacking fire even more. Paul has worked in technology and information security for over 20 years, holding various security and engineering roles in a lottery company, university, ISP, independent penetration tester, and security product companies such as Tenable. In 2005 Paul founded Security Weekly, a weekly podcast dedicated to hacking and information security. In 2020 Security Weekly was acquired by the Cyberrisk Alliance. Paul is still the host of one of the longest-running security podcasts, Paul’s Security Weekly, he enjoys coding in Python & telling everyone he uses Linux.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.