Search results

  1. Rick Butler

    Chinese Hackers Accessed US Treasury Workstations

    This isn't just about preparation, though - because one can prepare to the Nth degree and still have a catastrophic breach. So, what's the next step, mes amis? What's the answer when preparation is not enough?
  2. Rick Butler

    Chinese Hackers Accessed US Treasury Workstations

    Not really. If people are surprised by this, I would say, they're not really paying attention. It's not a question of if a breach will happen, but rather, when.
  3. Rick Butler

    Learn Coding for Cybersecurity?

    Only generally. Sure, programming is part of security, but it's not the end all, like the question intimates. And if you're going to assess programming knowledge, then what language do we plan to use? How will you assess that, given that there are a myriad of approaches in programming? /r
  4. Rick Butler

    Skills or Knowledge?

    Skills is just another way of saying applied knowledge, so I don't see a distinction. Really, it comes back to what hasn't been mentioned - experience. /r
  5. Rick Butler

    Email Content

    Well, actually, it's not how much you make, nor how much you keep; it's how much you can give away. (but that's a different matter of sage wisdom) *flips over fedora* - we'll pass this around and see if we can get some CIN'ers to fill it. Otherwise, playing the guitar on the street, singing...
  6. Rick Butler

    Email Content

    C'mon, bud. With all the conferences you attend, you can't sell me on the notion that you're that destitute...
  7. Rick Butler

    What prevents our students from completing their goals

    In that case, then I would recommend going over to our good friends at Biohazard Coffee (https://biohazardcoffee.com/). 928mg of caffeine for a 12oz cup. Even I had to cut it into regular coffee - that stuff is what powers gaming marathons.
  8. Rick Butler

    Email - Sent to Spam/Junk

    Well, no, the end user doesn't typically do these things. But RBL and SBL's can also interfere with e-mail transmission - preventing all those annoying spammers from setting up their own SMTP boxes and blitzing the world with spam.
  9. Rick Butler

    Security vs. Privacy: Which Should Take Precedence?

    We'll just draw a picture.
  10. Rick Butler

    Email Content

    If you want, I can walk you through the Defender console here at ITC and you can see some pretty incredible stuff. And with an Individual subscription, you do get a lot of Defender's capability, that would be relevant to a home user.
  11. Rick Butler

    What prevents our students from completing their goals

    As odd as it sounds, the fear of success is also something that can get in the way. Students fear the potential consequences of succeeding - sort of an exact opposite of the imposter syndrome. Sometimes, when you win, it paints a big bullseye on your back, with people having expectations of...
  12. Rick Butler

    Email Content

    Microsoft Defender 365.
  13. Rick Butler

    Chinese Hackers Accessed US Treasury Workstations

    Of course they did. Not even going to comment further - just going to say - trust another organization with your security and...well:
  14. Rick Butler

    Reinventing Security Awareness: Key Focus for 2025

    Oh, I think security awareness is far more than phishing and passwords. And I'm not so sure they are even in the top five anymore. Identity Protection is probably the most massive requirement now. Ransomware...malware protection, multi-factor authentication to replace those feeble passwords...
  15. Rick Butler

    Email - Sent to Spam/Junk

    Spam Block Lists such as the ones maintained by organizations like Spamhaus can have quite an effect on whether messages get classified as junk/spam/phish, etc. The MX Toolbox is a good place to check to see if a particular server is on a blocklist for spam/UCE. Properly constructed DMARC and...
  16. Rick Butler

    Security vs. Privacy: Which Should Take Precedence?

    Your compliance requirements trump all of this. Not every organization has the same requirements, but, for example, an organization operating in California or Virginia will have a greater adherence to privacy than, say, in Florida, as states adopt their own versions of the EU's GDPR guidance...
  17. Rick Butler

    Compromised Account

    Yup. $70/yr for an individual, $100/yr for a family up to six.
  18. Rick Butler

    Email Clients

    Nah - like so many other things on the internet, I just tend to avoid it where I can. Yahoo had it's day....but Google effectively beat it into obsolescence.