Smartphone vulnerabilities
Scott Kelly, platform architect at Netflix, gets to look at a lot of devices. In depth. He’s got some interesting things to say about smartphones. (At CanSecWest.) First of all, with a computer, you...
View ArticleImportance For Healthcare Security Pros To “Speak” Finance
As the number of healthcare data breaches continues to snowball, executives put in charge of safeguarding protected health information (PHI) can’t keep up with the risks inherent with increased...
View ArticleBuilding a Data Science Practice for Better Risk Management
The next stage of shared incident reporting and collaborative Big Data for true data sciences. Are you ready for it?
View ArticleSBN Sponsor Post
Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q
View ArticleThought paper on Domain Name Seizures
On behalf of the ICANN Security Team, I've written a paper that offers guidelines for anyone who prepares or contributes to the preparation of legal orders that include domain name seizuress,...
View ArticleProbing mobile (cell) networks
Mobile networks have many disparate types of devices. You can probably guess what some of them are, or even go to the provider’s store or kiosk and get a list. But there are going to be more devices...
View Article.rr.nu Malware Campaign – More Details
We are getting lots of questions about the latest mass compromise targeting WordPress sites (redirecting to fake AV) that has affected over 30,000 domains. The first question is how are these sites...
View ArticleBeing Stealthy with DGA Technology
Do you remember all the fuss about Conficker many moons ago and its odd method of locating C&C servers? Instead of relying upon a static list of preconfigured domain names that corresponded to the...
View ArticleVirtual Execution and the Emperors New Clothes
Some ideas sound so attractive in principle that it’s hard to fathom why the Internet security industry hasn’t leapt up and down all over them already. Take for instance the idea of automatically...
View ArticleTips for Launching Your Security Startup
For startups to succeed, they can't go it alone. They need to be part of the larger security ecosystem.
View ArticleVideo: RSA Conference 2012 : PechaKucha : Security Déjà Vu
So, here is a funny story. This past fall, my team came to me and said “hey, do we want to sponsor powered by PechaKucha night at RSA Conference 2012?” I vaguely recalled catching the tail end of this...
View ArticleMarch 2012 ISSA-Be Chapter Meeting Wrap-Up
This week is a very busy week! After the OWASP & Beltug meetings, I attended the ISSA Brussels Chapter Meeting tonight. Two excellent speakers (and friends) were invited to talk about their...
View Article6 Quick Steps for N00bs Understanding Risk Assessments
Although this article came out a few months ago I’ve been meaning to put it out there as it may give those unfamiliar with addressing risk a good overview of what’s involved. In this case study the...
View ArticleRisk Management Priorities Change Given Job Responsibilities
Just change jobs and you'll have a completely different perspective of what are the most important assets in your company and what's at risk.
View ArticleTarget NYC: Simulated SCADA Attack Contemplated
News, via Bloomberg’s Eric Engleman and Chris Strohm in Washington, D.C., detailing the contemplated SCADA security exercise, targeting the New York City w grid. Focusing on a simulated attack, during...
View ArticleInfoSec Daily Podcast Episode 614
Episode 614 - PwnedSauce, Odd Targets, WormPress Fake A/V, P2P Botnet and Body Scanner Bypass
View ArticleToday’s Genius, Tomorrow’s Scientist
Behold: Ladies and Gentlemen, Girls and Boys, the outstanding and brilliant engineering efforts of Miss Audri Clemmons; whom, interestingly, exhibits the most astounding execution of Scientific Method...
View Article"Protecting Privileged Domain Accounts: Disabling Encrypted Passwords"
[Author's Note: This is the 3nd in a multi-part series on the topic of "Protecting Privileged Domain Accounts". My primary goal is to help incident responders protect their privileged accounts when...
View ArticleHacking Displays Made Easy
Displays are monitors, right? Strictly output, right? Wrong. DVI and HDMI both support DDC, which allows for display identification and “capability advertisement.” In other words, the display is...
View Article