Looks like I'll be spending another $30/month on my health insurance in 2017. Thanks, Obamacare.

Seems like people's definition of "fake news" depends on which forked reality you're currently inhabiting.

Nice to know Check Point Threat Emulation agrees with my visual assessment of that attachment: "behaves like a known malware."

@kdfrawg if it's not one thing, it's someone else… :(

//

it's a pretty basic one.

//

They're a challenge for everyone, I think…

//

Citrix is a common way to solve these kinds of problems. There is always "analog hole" issues to worry about no matter what method, though.

they're trying to restrict the flow of data, clearly. Not an easy problem to solve while maintaining some level of usability.

I have two firewalls, three network segments, and at least three access points. Yes, I go a little above and beyond, but it gives me a way to use and understand the technology Check Point sells.

The main thing people need to realize with security is nothing is 100% secure without being 100% unusable. There's a balance we try to achieve and sometimes we err on one side or the other.