Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re: What has not been hacked yet? (Score 1) 35

I see Zero Trust Architecture (ZTA) differently than just lip service. If the company actually commits to it (and its associated cost, which is usually somewhat significant), it is a totally valid defense strategy. With traditional "primarily relying on perimeter defense", companies are effectively setting up a single point of failure for their everything. I have seen so many companies who relied mostly on perimeter defense, with services not requiring auth, or they used long lived API keys (often hardcoded in source :|). Or fully open network because "the central firewalls will take care of it". In these situations, if an attacker were to breach the perimeter, the blast radius is huge as far as their lateral movement in the org and data exfil possibilities. Those were always the fun ones because pen tests are easy with tons of findings coming with little effort needed on my end.

ZTA is all about "Keeping control of the infrastructure, supply chain due diligence, and maintaining and understanding the perimeter". The real mind shift is the perimeter shifts from some centrally managed thing to the perimeter around a service. ZTA in my experience has mostly been things like:

- all service -> service comms are encrypted (usually trivial with HTTPS or mTLS). (you can get service -> service mTLS "for free" in k8s with stuff like istio, and HTTPS is well established for decades at this point)
- all service -> service comms use limited scoped auth with limited time windows (usually pretty easy with JWTs and some platform level key mgmt)
- services are only allowed to the other services they need to via network ACLs (usually pretty easy with IaC for the svc)
- services are not allowed to talk to the public internet by default, with exceptions OK when it is technically necessary (usually pretty easy with IaC for the svc)

I like to explain ZTA to normies like this: cyber security is best thought of as layered (like the concept of defense-in-depth). Imagine each layer is a piece of swiss cheese. Yes this layer may have holes in it. But if you stack a bunch of layers in just the right way, there are no holes which make it all the way through. Relying primarily on perimeter defense is like having only 1 or 2 layers. ZTA is like having dozens of layers.

I just got done implementing a 100% on-prem ZTA for a company, but after seeing the cost materialized after a few months, they not only reverted back to their old ways, they fired most of their security staff. The problem with a lot of this is not only does it require a mind shift from management, it requires a mind shift from software engineers who are notoriously lazy as fuck (and/or overworked and choose to not do security b/c mgmt doesn't care about it) when it comes to cyber sec implementation and/or estimation.

I really feel ZTA has lots of moral benefits, but the business incentives for it have not yet aligned, so most people aren't doing it.

Comment Re:"enterprise-grade anti-ransomware" (Score 1) 14

I am all in favor of offline backups, can't argue against that. All these agents running as root can't be great for sure. I am curious how you are performing backups without root though? Are they not complete backups of the system (e.g. they don't include files which are only readable by root)?

Comment Re:I'm seeing that on servers too (Score 1) 56

I'm evaluating AMD's next gen (Genoa) which is under preview on some providers, and while it's under NDA and you won't hear much about it yet, there is an actual per-core improvement (in addition to the number of cores), unlike this sort of 3% etc Intel has been managing lately...

It may interest you to look at the recent Phoronix benchmarks of the new Epyc Genoa based AWS EC2 instances here: https://www.phoronix.com/revie... These AMD chips are super fast.

Comment Re:Mid west? (Score 3, Informative) 70

I think it makes more sense when looking at a "US territory evolution over time" map like this for context: https://en.wikipedia.org/wiki/... Up until about 1803, Ohio was part of the "Northwest Territory". I assume as the USA expanded further westward after 1803 and places like the "Pacific northwest" region arose in the nomenclature, the Ohio area being called the "mid-west" was a natural evolution.

Comment Re:TWA (Score 1) 59

The GPS tracking is not used to investigate crimes. It is used to track potential clients and people belonging to marketing target groups in order to redirect the astroturfer population flows towards them.

The data is collected, warehoused, and probably indexed for later search-ability. The data can be used both to sell shit, but also to drive a case for incrimination. It is silly to believe it would not be used in such a way, especially when there is amble evidence to the contrary, e.g. TFA

Comment Re:Looks like nobody cares (Score 1) 24

I agree no individual attacker would likely look through huge volumes of footage. That would be a silly use of human time IMO. Far better to automate this. I'm thinking running the video through image classification jobs trained on nudity. The attacker could then use identified nude videos of people for blackmail.
Privacy

Net Users In Belarus May Soon Have To Register 89

Cwix writes "A new law proposed in Belarus would require all net users and online publications to register with the state: 'Belarus' authoritarian leader is promising to toughen regulation of the Internet and its users in an apparent effort to exert control over the last fully free medium in the former Soviet state. He told journalists that a new Internet bill, proposed Tuesday, would require the registration and identification of all online publications and of each Web user, including visitors to Internet cafes. Web service providers would have to report this information to police, courts, and special services.'"
The Internet

Submission + - Internet's First Registered Domain Name Sold (hothardware.com)

MojoKid writes: "Believe it or not, it wasn't iternet.com or dot.com that was purchased when the Internet was "born." Instead, it was the somewhat off-the-wall name of symbolics.com. The Symbolics company was the first to use an internet domain name to guide Internet viewers to its line of Lisp machines, which were single-user computers optimized to run the Lisp programming language. XF.com Investments, which is a Missouri-based Internet investments firm, has managed to secure the domain name from its original owner for an undisclosed sum and XF's CEO was quick to proclaim his excitement over the acquisition. It's hard to say why this domain name was the first purchased back on March 15, 1985, but for obvious reasons it holds a special place in history. There has been one original owner for nearly 25 years. Over that time, we've seen the Internet grow to the tune of 180,000,000+ registered domains, and thousands more are being added each and every day."
Idle

Submission + - Piranha Discovered in UK in Devon River 1

Hugh Pickens writes: "With razor-sharp teeth piranha, native to the Amazon basin, the Orinoco and the rivers of the Guyanas, are generally considered to be the most ferocious freshwater fish in the world with a voracious appetite for meat, able to strip the flesh of large animals within minutes when traveling in a shoal. So when members of the British Environment Agency were conducting a sampling trip in the East Okement tributary of the River Torridge, they were amazed to see a large tail emerge from the undercut bank on the far side of the river. "What we actually discovered was something we would not expect to find in our wildest dreams — we could hardly believe our eyes," says Eddie Stevens. "Our first thought was that a sea trout had become lodged in amongst the rocks and debris collected under the bank, but when it was removed from the river we were speechless to find it was a piranha." Tests carried out on the dead piranha revealed it had been eating sweet corn, which proved it must have been kept as a pet. The Environment Agency said it believes the piranha was alive when it was put in the river, possibly because at 35 cm it had become too big for its tank. "Whilst piranhas can't survive the colder climates of the UK, this latest find highlights a real issue — that releasing unwanted exotic pets or plants into rivers can have serious consequences for native wildlife," says spokesman Paul Gainey. "Rather than dumping things in the wild, we would urge people to seek advice about what to do with exotic species.""

Comment Re:You can shoot people, son, but don't blog! (Score 2, Insightful) 202

Sure, but if you're stationed in Iraq, you're basically "on the job" 24/7, with long periods of complete boredom. Further, you're unlikely to have your own computer equipment to use, and are totally dependent on the military to provide it for you.

I have to disagree with you on a few points. My brother is USMC and finished 2 tours in Iraq before going to Afghanistan. His M.O.S. is MP, and he got assigned to do convoy security, probably the worst job out there because of all the IEDs. First off, in Iraq he was not 'on' 24/7 and definitely never had periods of long boredom. He would pull 20 - 48 hour shifts driving from 1 end of the desert to the other. Then he would sleep for approximately 6 hours a night and continue. He rarely had any downtime but when he did he would use his own computer to access the Internet off-base in somewhere in Rhamadi, apparently one of the few places you can get Internet access. Occasionally he would be given Internet access on-base, but this was rare. When he came back, before going to Afghanistan, he told me that talking with friends online was one of the only things that kept his sanity in such a crazy place. Also some of you reading this may not like the war or why we're there, but just remember that there are people over there pulling insane shifts doing unimaginable things for next to nothing. Semper Fi.

Slashdot Top Deals

Nature always sides with the hidden flaw.

Working...