Commentary
Commentary
Commentary
Commentary
Commentary
News
Commentary
Quick Hits
News
Commentary
Quick Hits
News
News
Commentary
Commentary
Commentary
News
Commentary
@ Technocrati "these companies are not in the business of security" Very true, but then again we can't expect every company not "in the business of security" to be driving security as a prime business goal -...
In reply to: Re: J.P. Morgan and The Big Hole
What's most disturbing here is that we look to financial institutions as the "gold standard" for security. @Kelly Your point is absolutely correct, there is no argument there. But I ask,...
In reply to: Re: J.P. Morgan and The Big Hole
Have you compiled predictions for the year 2015? If so, do you plan on creating another article to denote them?
I would be interested to see how your predictions align with the roadmapped enterprise initiatives.
In reply to: 2015 Predictions
What's most disturbing here is that we look to financial institutions as the "gold standard" for security. If one of the biggest of these institutions didn't perform basic security best practices, we should be very, very...
In reply to: Re: J.P. Morgan and The Big Hole
While I agree that proven forensic tools are essential, we cannot rely on technology to catch the bad guy. Let's not forget that in order to make these forensic tools work, knowledgeable people and established processes...
In reply to: Re: Why Digital Forensics In Incident Response Matter More Now
I truly agree with you Kelly. Smart home devices are really vulnerable to attacks if an attacker has a physical access to the devices. Not only this, I have even heard once that an attacker has made some changes in a device...
In reply to: Smart home devices
DrT, that is a great point about building a "knowledge base" of past attacks. It's a lesson perhaps transferable from other catastrophe types, like say hurricanes. Experts there study past hurricanes, not that one is replicable...
In reply to: Re: Knowledge base for attacks
True. They must have been downloading data for a while. This is not something that can be downloaded quickly unless they compromised physical backup types or disks they must have been working on it quite some time, giving...
In reply to: Re: Go offensive
Malware similarities are mainly irrelevant if it is already released to public. There has to be better evidence than that to convince other about it.
In reply to: Re: Sony is just another company that is wide open
There may not be any opportunities after all. The risk is that if we constantly get what the treat is wrong, it is not going to be easy go us to avoid them in the future, simply because we could not be building an international...
In reply to: Re: Sony is just another company that is wide open
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?