Blog Posts Tagged with "Jeffrey Carr"
February 16, 2012 Added by:Jeffrey Carr
We should re-assess which attacks should be investigated and which should be let go. The FBI and US-CERT are overwhelmed with tracking everything from probes against government networks to DDoS attacks to targeted attacks against the Defense Industrial Base...
February 01, 2012 Added by:Jeffrey Carr
As the world's largest vendor of security software, the breach puts all of its corporate and government customers at risk, because if Symantec didn't know the extent of its breach back then, how do Symantec's customers know that their current product line is safe to use?
January 26, 2012 Added by:Jeffrey Carr
Symantec has acknowledged that source code for multiple products was stolen in 2006. The worst part is that Symantec was clueless about the theft of its own source code for almost six years, which means that thousands of customers were clueless as well...
January 12, 2012 Added by:Jeffrey Carr
I compared the emails in the .bat archive of Mr. Reinsch with emails allegedly collected through RINOA SUR against multiple USCC commissioners and they were identical, either a tremendous coincidence or evidence that YamaTough has invented this entire scandal...
Making Sense of Split Tunneling ... nat ravitz on 03-06-2014
The Target Breach: How Network Security Best... Barry Herne on 03-05-2014
Making Sense of Split Tunneling ... nat ravitz on 03-05-2014