| Website | https://www.cyberimpact.com.au |
| Website | https://www.cyberimpact.com.au |
I use a Yubikey for authentication. I keep it on my key ring. My wife has a one which also works as a duplicate of mine. In case the house burns down and we lose our keys, I’ve kept another yubikey in a safety deposit box. So without thinking, I put the key to the safety deposit box on my key ring. Dumb move. What should I do with it?
I wonder if organisations started literally valuing the data they hold from an accounting treatment perspective (bit like how they value good will) they hold as an asset (or liability) to the company, how would that change an organisation?
Here are all the Blackhat USA 2023 presentations:
https://github.com/onhexgroup/Conferences/tree/main/Black%20Hat%20USA%202023%20slides
Does anyone have any recommendations of a tool or service being able to search the dark web continuously, passively (so no one knows I am looking for it), and automatically notify me of company names or individual names that have been hacked and had identity documents stolen, whereby they are being talked about on the dark web and/or offered for sale?
A great organisational culture is key to success in managing #informationsecurity. Don't waste money on technology based solutions if the culture is not right. Fix that first. Culture eats strategy for breakfast.