Prevent #HealthCareNightmares:
application whitelisting, run AV everywhere, monitor, multifactor auth, isolate, encrypt #enigma2016
-
-
Replying to @unixgeekem
@unixgeekem@taviso would disagree on the AV part ;)#enigma20161 reply 0 retweets 0 likes -
Replying to @flameeyes
@flameeyes@taviso I would say AV is better than nothing, even if it's known to be imperfect.#enigma20161 reply 0 retweets 0 likes -
Replying to @unixgeekem
@unixgeekem I'd say@taviso proved time and again that with *current* AVs it can often reduce security, rather than improve :(#enigma20161 reply 1 retweet 0 likes -
Replying to @flameeyes
@flameeyes@taviso - while advanced attackers are able to bypass AV, AV is best at protecting against stupid threats.#Enigma20161 reply 0 retweets 0 likes -
Replying to @unixgeekem
@unixgeekem@flameeyes The problem isn't bypassing, the problem is that AV software is dangerously insecure and makes things worse.4 replies 11 retweets 18 likes -
Replying to @taviso
@taviso@flameeyes - so you're saying AV makes all things worse and is not useful for blocking any threats?2 replies 0 retweets 0 likes
@unixgeekem @flameeyes Yes, If you blacklist a CRC32, but allow remote code execution as SYSTEM, I think you've made things worse.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.