News and Opinion
Links to everything discussed in episode 428 of the Risky Business podcast.
Links to everything discussed in episode 427 of the Risky Business information security podcast.
Links to everything discussed in episode 426 of the Risky Business information security podcast.
Links to everything discussed in episode 425 of the Risky Business infosec podcast. I had to cut a fair bit this week so there's stuff in here that you won't hear on the show.
Links to everything discussed in this week's edition of the Risky Business security podcast.
Links to everything discussed in episode 423 of the Risky Business security podcast.
Last week I dashed off a very quick post about #CensusFail that went stupid viral. I think it was retweeted about 1200 times and it sort of became "the story" of what happened.
As far as I know the information I posted is accurate, but I wanted to write this to add a bit more context and look at where it's shaky. I literally wrote that thing up in about 10 minutes while I was working on last week's show. I was doubly under the pump because The Project had a camera guy coming to my house that evening to record an interview about the whole debacle.
I'd also just arrived back in Australia after spending six days in Las Vegas attending Black Hat, B-Sides and Defcon. Prior to that I was in Brazil. So yes, long story short, I was exhausted, jet lagged, slammed with work and I didn't really have much time to write a decent post. I certainly wasn't expecting what I did write to be spread so widely. So, now that I've had a minute to breathe, let's look back through the bullet points in original post to see where it's solid and where it isn't.
Links to everything discussed in this week's episode of the Risky Business podcast.
I have been able to cobble together the following by talking to my sources. Sorry this post is so brief, but I'm still trying to get this week's show out and I'm massively under the pump. So here it is: Set your faces to stunned.
- IBM and the ABS were offered DDoS prevention services from their upstream provider, NextGen Networks, and said they didn't need it.
- Their plan was to just ask NextGen to geoblock all traffic outside of Australia in the event of an attack.
- This plan was activated when there was a small-scale attack against the census website.
Links to everything discussed in episode 421 of the Risky Business security podcast.
Putting your life in TBB's hands is maybe not so wise...3 days 1 hour ago
Not a crazy amount of news this week, but some cool stuff nonetheless...3 days 1 hour ago
PLUS: Cylance CEO Stuart McClure on the OPM hack...1 week 3 days ago
Lots of good stuff this week...1 week 3 days ago
Mark Piper joins Risky Business with the week's security news...2 weeks 3 days ago