Should you consider a system compromised if someone could have physically accessed it, but you have no evidence they did?

An old adage is that if an adversary physically accessed your system, you should consider it compromised. My question is, what if they could have, but you have no evidence they did?

For example, let us say that you were walk… Continue reading Should you consider a system compromised if someone could have physically accessed it, but you have no evidence they did?

Does Real-time typing view in chats invades privacy? Are there any detection and prevention methods?

When a customer talks with a representative of a company in a chat on a web-page, it is possible that they are actually sending every keystroke to their server before you hit the enter or click the send button.

You are barte… Continue reading Does Real-time typing view in chats invades privacy? Are there any detection and prevention methods?

Does Real-time typing view in chats invades privacy? Are there any detection and prevention methods?

When a customer talks with a representative of a company in a chat on a web-page, it is possible that they are actually sending every keystroke to their server before you hit the enter or click the send button.

You are barte… Continue reading Does Real-time typing view in chats invades privacy? Are there any detection and prevention methods?

Deception vs Analytics, or Can Analytics Catch True Unknown Unknowns?

This is a debate post, and not a position post. The question alluded therein (hey… I said “alluded therein” to sound like Dan Geer, no?) has been bugging us for some time, perhaps for 2+ years. However, we deferred this debate and hid… Continue reading Deception vs Analytics, or Can Analytics Catch True Unknown Unknowns?