August 18, 2011 Added by:J. Oquendo
The media, security companies, and the “Cybersecurity Industrial Complex” labels almost all attacks as Advanced Persistent Threats almost always originating from China. The mechanism for identifying the attackers is always the same: "The attacker came from the following IP address..."
August 18, 2011 Added by:Javvad Malik
Given the number of devices currently connected to the internet, factoring in new devices that are being added daily, subtracting devices being removed, factoring in energy reserves and the possibility of a giant tsunami wiping out humanity, I have approximately 134.2 years to go...
August 17, 2011 Added by:Robb Reck
Throughout the Black Hat briefings, I didn’t once hear the words “defense in depth” or “return on investment.” What I got instead is examples of how the bad guys are going to break into specific systems. Black Hat doesn’t have a management track, the focus is on hands-on attacks and of systems...
August 17, 2011 Added by:Rafal Los
I know many of my colleagues in infosec sympathize with the Anonymous cause, because it's not too difficult to do so. While I won't comment on how I feel about that - I can tell you I absolutely do not condone the reckless actions and short-sighted activity that leads to more harm than good...
August 16, 2011 Added by:Tony Campbell
Book publishers need to up their game in terms of their quality assurance processes in order to demonstrate their true worth to their customers, something that the charlatans, such as Gregory Evans and Ali Jahangiri, will always fail to deliver upon – since these guys are not publishers...
August 16, 2011 Added by:Nick Owen
My goal is to provide information security pros a basis for discussing risks with business pros. For information security pros, the goal should be to reduce the risks of cash flow streams so that the cost of capital for projects are less than the firms weighted-average cost-of-capital...
August 16, 2011 Added by:Sasha Nunke
Ambiguity abounds due to lack of a universal philosophy of compliance. A big challenge for security professionals is navigating this ambiguity, especially when financial auditing terms such as GRC are loosely applied to IT security solutions. Let the buyer beware...
August 15, 2011 Added by:Enno Rey
When the standards were written, endpoints were supposed to be mostly company managed Windows systems. In the meantime most organizations face an unmanaged mess composed of a growing number of smartphones and tablets, some company managed, while some are predominantly free floating...
August 15, 2011 Added by:Anton Chuvakin
I spent years whining about how use cases and your requirements should be driving your SIEM purchase. And suddenly Anton shows up with a simple Top 10 list. This list was built with some underlying assumptions which I am not at liberty to disclose. Think large, maybe think SOC, think complex environment...
August 15, 2011 Added by:Simon Heron
Remember that scene in the Matrix where our hero Neo is on the run and he just grabs a phone off some bystander and is immediately able to cancel the existing call and dial a new one? That seemed totally believable at the time. I just wondered what the equivalent might be these days?
August 15, 2011 Added by:Scot Terban
It is readily apparent from this POS that McAfee has put out that they are just fishing for some press here for their flagging AV sales. This paper gives nothing relevant to the story around APT and as such, it should be just relegated to the dustbin of the internet and forgotten...
August 15, 2011 Added by:David Martinez
In the end, I had the hashes for the admins table, full customer info from the customers table, as well as the full output of the transactions and users tables, which included MD5 hashes of CC numbers. The hashes were all 64-bits from a MySQL db, which means they were probably SHA256...
August 14, 2011 Added by:Lenny Zeltser
To understand riots, consider the importance of de-individuation of the mob's participants, the importance of instigating events and the role of the "entrepreneur" in starting the chain reaction of a riot. There are parallels to the dynamics of modern Internet hacktivism...
August 14, 2011 Added by:Tony Campbell
Enterprise Mac Security is an absorbing read and equally applicable to securely configuring a Mac server as it is to a Mac laptop. There is so much good quality security material available that it would be easy to allow a review to almost become a book in its own right...
August 13, 2011 Added by:Kelly Colgan
Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...
August 12, 2011 Added by:Scot Terban
Data dumps without context have no real intelligence worth. While this stuff is interesting, it’s certainly not earth shattering. What’s worse is that it makes you all look more and more like the boy who cried wolf than the Deep Throat. This is why I keep harping on Anonymous...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013