New York is contemplating a bill that adds surveillance to 3D printers:
New Yorkโs 2026ยญ2027 executive budget bill (S.9005 / A.10005) includes language that should alarm every maker, educator, and small manufacturer in the state. Buried in Part C is a provision requiring all 3D printers sold or delivered in New York to include โblocking technology.โ This is defined as software or firmware that scans every print file through a โfirearms blueprint detection algorithmโ and refuses to print anything it flags as a potential firearm or firearm component.
I get the policy goals here, but the solution just wonโt work. Itโs the same problem as DRM: trying to prevent general-purpose computers from doing specific things. Cory Doctorow wrote about it in 2018 andโmore generallyโspoke about it in 2011.
Palo Alto Networks Unit 42 and AWS Announce Expanded Collaboration, Launching No-Cost Retainer for AWS Security Incident Response available in AWS Marketplace
Speed is everything in todayโs security landscape. From Unit 42ยฎโs frontline experience responding to more than 500 incidents last year, we've seen that in nearly one in five incidents, attackers go from initial compromise to data exfiltration in less than an hour. It leaves almost no time to react.
The challenge is compounded by the distributed nature of the modern IT environment; cyberattacks are rarely confined to one location. In fact, 70 percent of incidents now span three or more attack surfaces, from endpoints and networks to multiple cloud environments. This complexity increases vulnerabilities, which is a key reason why 86 percent of major incidents disrupt business operations.
When a breach moves at this speed and crosses complex silos, an enterprise has two immediate, critical needs:
Rapid, integrated expertise to contain the threat at its source within the cloud.
Holistic, end-to-end investigation to determine the full scope of the attack, tracing the attacker's path wherever it leads, across all systems and environments.
The No-Cost Unit 42 IR Retainer Available on AWS Marketplace
Recognizing customers need a faster, more comprehensive incident response strategy in the cloud, Palo Alto Networks Unit 42 is expanding our partnership with Amazon Web Services (AWS) Security Incident Response service. The collaboration introduces a no-cost Unit 42 Incident Response Retainer, which is now available to qualified customers in AWS Marketplace. Our value-added offer provides qualified customers with rapid access to Unit 42โs world-class investigative expertise and dramatically minimizes the critical time between an alert and full containment.
For qualified customers, here's what the no-cost Unit 42 Incident Response Retainer offers:
250 hours of initial Unit 42 Incident Response services at no cost.
A 2-hour response time agreement for incident response.
24/7/365 access to the Unit 42 Incident Response team.
As an AWS Security Incident Response Service Ready partner, this collaboration is designed to deliver seamless, end-to-end incident response and proactive security services. By combining Unit 42โs deep experience in managing complex, legally privileged investigations with the rapid engagement of AWS Security Incident Response, organizations can resolve critical incidents faster and more comprehensively.
Unit 42 also offers preferred pricing to AWS Security Incident Response customers for proactive services through paid retainer offerings, also available in AWS Marketplace.
Hart Rossman, Vice President of Global Services Security, AWS:
When cyberattacks move at cloud speed, customers need immediate access to comprehensive expertise. By integrating Unit 42's end-to-end investigative capabilities with AWS Security Incident Response, we're delivering a unified response that helps customers contain threats faster and minimize business disruption. The no-cost retainer ensures they can activate the full scope of resources they need within minutes, not hours.
Effective response to a cloud breach demands deep technical skill and the ability to manage complexity under pressure. Unit 42 excels at managing high-stakes incidents. By coupling our expertise with AWS Security Incident Responseโs capabilities to prepare, respond and recover from security incidents, Unit 42 offers customers a unified defense. Streamlining the entire process, from initial alert to final resolution, allows organizations to get back to business faster and limit operational disruption.
A Unified Front Against Complex Cloud Incidents
The collaboration is designed to solve a critical customer problem: Reduce the time and complexity of responding to incidents that span both AWS resources and the broader enterprise.
The combined offering delivers three key benefits, providing customers with a holistic and agile defense strategy:
Comprehensive Investigation: Unit 42โs expertise enables an investigation across multiple environments, including endpoints, networks and other enterprise data sources, complementing AWSโs incident response technologies and expertise.
Rapid, 24/7 Access to Experts: AWS Security Incident Response provides direct, 24/7 access to the AWS Customer Incident Response Team (CIRT), capable of engaging within minutes. Unit 42 is skilled at serving in the incident command role, coordinating efforts among internal stakeholders, other forensic and recovery vendors, as well as legal counsel.
Response Readiness with No-Cost Retainer: The offering removes the typical administrative and procurement overhead of incident response engagements. The added value ensures qualified customers can activate the full resources of Unit 42 instantly, often at the direction of counsel.
Availability
The Unit 42 Incident Response and proactive service offerings are available in AWS Marketplace today. More information on the partnership will be shared during AWS re:Invent 2025 (December 1-5, 2025).
Kent Ickler & Jordan Drysdale // BHIS Webcast and Podcast This post accompanies BHISโs webcastย recorded on August 7, 2018,ย Active Directory Best Practices to Frustrate Attackers, which you can view below. [โฆ]
Jordan Drysdale//* In this blog, we are assuming that we have obtained an access key, a secret key and maybe a .pem key from a network user who left these [โฆ]
Jordan Drysdale// Full disclosure and tl;dr: The NCC Group has developed an amazing toolkit for analyzing your AWS infrastructure against Amazonโs best practices guidelines. Start here: https://github.com/nccgroup/Scout2 Then, access your [โฆ]
Brian Fehrman // In a previous post, titled PowerShell without PowerShell, we showed you how you can bypass Application Whitelisting Software (AWS), PowerShell restrictions/monitoring, and Command Prompt restrictions. In some [โฆ]
Lawrence Hoffman // Hey, Iโm back! Vacation was great. I spent part of last week on an Island so I was unable to scratch the keep-up-with-the-media itch. Now that Iโm [โฆ]