Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

motherboard

The DEA Didn’t Buy Malware From Israel’s Controversial NSO Group Because It Was Too Expensive

12th September 201912th September 2019 peterglock

The lesson from this is don’t assume that your mobile device is secure…: The U.S. Drug Enforcement Administration (DEA) did not buy hacking tools from malware company NSO Group because […]

 Android, Be Aware, cybersecurity, exploits, hacking, Information Security, iPhone, motherboard, WhatsApp, zero days  Glock Takes Stock

This Interactive Map Tracks Our Growing Surveillance State

12th September 201912th September 2019 peterglock

Given that the U.K. is widely touted as the country with the most number of CCTV cameras per head of population (surely, we’ve been overtaken by China?) it’s interesting to […]

 Cyberlaw, EFF, motherboard, surveillance  Glock Takes Stock

Google Says Malicious Websites Have Been Quietly Hacking iPhones for Years

30th August 201930th August 2019 peterglock

iPhone users’ sense invincibility suffers a blow…: In what may be one of the largest attacks against iPhone users ever, researchers at Google say they uncovered a series of hacked […]

 Apple, Be Aware, google, hacking, Information Security, iPhone, jailbreak, malware, motherboard, project zero  Glock Takes Stock

Cities Asked Ring to Share ‘Registry Lists’ of Customers Who Bought Surveillance Cameras

21st August 201921st August 2019 peterglock

Who should have access to CCTV footage?…: Cities and local police departments have asked Ring, Amazon’s home security company, to share the names, home addresses, and email addresses of every […]

 Amazon, Cyberlaw, law enforcement, motherboard, police, surveillance  Glock Takes Stock

Vulnerability Exposed Microsoft Azure Users to Cyberattack

8th August 20198th August 2019 peterglock

TL;DR – turn on automatic updates…: New data from Check Point Research says dozens of vulnerabilities found in a commonly used protocol left millions of Microsoft cloud users open to […]

 Be Aware, hacking, Information Security, microsoft, motherboard  Glock Takes Stock

Recent Posts

  • Microsoft: Windows 10 1909 reaches end of service next month
  • Israel appears to confirm it carried out cyberattack on Iran nuclear facility
  • The SOC is blind to the attackable surface
  • Ambit, Inc. Announces the Release of AmbitVPN’s Post-Quantum Native Windows Application
  • Zero trust: The good, the bad and the ugly

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

VAT No: EE102351110

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

3 days ago

Glock Enterprises Ltd
buff.ly/3uySeQkZero trust: The good, the bad and the uglyWe saw a lot of “Cloud Washing” when timeshare morphed via ASP to Cloud. I’ve seen disk drives marketed as “My Cloud” which kind of misses the point...:[...] The bad side of zero trust concerns the misunderstandings that are currently being propagated. "Among the misconceptions Kindervag is eager to dispel is that zero trust makes a system 'trusted,' and that it is just about identity and multi-factor authentication (MFA)," mentioned Zorz. "Zero trust eliminates trust from digital systems, because trust is a vulnerability that can be exploited."If Zero Trust was equal to MFA (as many vendors claim), then neither the Snowden nor Manning breaches would have been able to happen," explained Kindervag. "They had very robust MFA and identity solutions, but no one looked at their packets post-authentication."Something else that Kindervag finds disconcerting is that vendors are redefining the meaning of zero trust so that it coincides with what their products are capable of doing. According to Kindervag, there are no "zero trust products." He told Zorz, "There are products that work well in zero trust environments, but if a vendor comes in to sell you their 'zero trust' product, that's a pretty good indication that they don't understand the concept."[...]Original article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes