Society Wants Technology – Does Not Realize Security Implications

Everyone heralds new improvements ever since the Renaissance in the 15th century  started an artistic and scientific improvement binge every year. We are moving to another new year since time does not stand still for us to digest the current technology.   Johannes Gutenberg small bio at physic.org So in 1440 we were inadvertently thrust … Read more

Cyberjoke Friday V1.9 Christmas Star Wars Edition

Sometimes we Have to go back to the good things: From http://unijokes.com/it-jokes/  websites   Where’s the best place to hide a body? Page two of Google. How do two programmers make money? One writes viruses, the other anti-viruses. I changed my password to “incorrect”. So whenever I forget what it is the computer will say … Read more

What To Look For In Logs: Hackers Being Successful

Today there was an interesting VISA BlackPOS informational webinar today. What I got out of it is some more information to make sure and keep in mind these items when looking for Indicators of Compromise(IOC). VISA¹ has a great program to help small businesses protect themselves against cyber attacks There were a lot of good … Read more

If Offense Has Advantage We Must Analyze Logs Better

If  the theory says that Offense will always find a way into your environment (somehow) with  a mistake or just better attacks then we must get better at developing Logs and react to attacks as fast as we can. This interesting and well thought out guide from Crest-approved.org¹ discusses what should be done in the … Read more