Network Security School of Ft. Knox
Summary of the "Network Security School of Ft. Knox" series I penned and the webinar accompanying it.
Summary of the "Network Security School of Ft. Knox" series I penned and the webinar accompanying it.
The last installment explains the importance of knowing what to do when a breach is detected.
InfoSec attackers are not created equal. They range from punk kids to nation states. It's important to know who is coming after your protected assets.
Some easy and free steps to keeping a Windows laptop free of viruses and other nasties.
Figuring out what data sources are best suited for pervasive network surviellance can be tricky. In this fifth installment, we look at the pros and cons of packet capture and NetFlow.
Not all types of cyber attacks are the same. In this third installment we look at different exploit types and their delivered payloads.
Some steps that can be taken to make your web site a tougher target for hackers to exploit and use against your visitors.
In this second installment we look at the difference between signature and behavioral detection schools.
The beginning of a six part series on how to approach network security. This installment covers the importance of perimeter defense.
Pornographic and piracy sites are no longer the haven for malware they once were. You might be surprised to learn that blogs (like this one) are where you are most likely to get infected.
When rules restrain retaliation against inappropriate behavior lesser men are able to gain an advantage over greater men. I retell a story of how I tormented an honorable Marine that was ham-stringed by regulation and how the lessons I learned that night in a New Orleans bar can teach us something on when we should strike back against cybercriminals and state sponsored attacks.The Pentagon is currently seeking permission to strike against attackers and I explain why I support the proposal.
Password Day comes but twice a year and this year I've added a couple of new traditions to the celebration. I've crumbled and started using password management and am giving SMS authentication a whirl.