Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CW
Posts
0
Comments
570
Joined
2 yr. ago

  • Documents marked "not for public release" aren't classified. They're what's called controlled unclassified information (CUI). It's anything from PII, law enforcement victim records to sensitive (but unclassified) technical manuals. There's dozens of categories if anyone cares to look at them: https://www.archives.gov/cui/registry/category-marking-list

    They shouldn't be sitting out there, but it's also not a crime.

  • This doesn't sound any different than what most host based AV already do. The novel idea is implementing it in on the storage array directly in a way that doesn't hose performance. That means instead of needing 100% coverage of all clients to detect/ prevent ransomware encrypting your network storage, the storage array can detect it and presumably reject the compromised client.