Hidden Hacks In Network
I’m often thinking where the next attack can come in and unfortunately it may come where we least expect it. Spiceworks blogpost has an interesting angle: How often have cloud…
Defend Your Systems
I’m often thinking where the next attack can come in and unfortunately it may come where we least expect it. Spiceworks blogpost has an interesting angle: How often have cloud…
Just for fun I wanted to make the headline to be “Make Software Secure Again” But when was software secure? Never, as we assumed it was secure but actually SW…
Compliance standards have similar goals (PCI – HIPAA – SOX – e-discovery) and the question is what should your password policy be to fulfill compliance and your own security risk…
Did you want to set up your own Intrusion Analysis department? Or at least give a framework for creating a method to understand a breach. Then read this document at…
I’m always scouring the net for interesting presentations and this is an interesting one, from Bsides Detroit By Gordon MacKay¹ which have been put on the Net by Adrian Crenshaw…