Give a man an 0day and he'll have access for a day, teach a man to phish and he'll have access for life."
"Information Security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information."
The focus of InfoSec is balancing protection of the Confidentiality, Integrity and Availability of data. Data security should focus on effective policies that don't impede operational efficiency.
more info: https://www.owasp.org/index.php/Application_Threat_Modeling
PHI: health status, provision of health care, or payment for health care created or collected by a Covered Entity
This exploit breaks application isolation and allows one program running on an OS to access memory used by other applications. We were vulnerable to this until Aptible rolled out a fix early this week!
Spectre exploits a CPU's speculative execution of code and can be used to read data from the CPU's cache. This can allow attackers to access things like passwords typed into different browser tabs.
https://meltdownattack.com/