Can the Cloud “Fix” Your Security Risks?

A nice article at Network World about how Milwaukee Tool used the “Cloud” to remake a significant part of the company (product development collaboration). (I like that picture) So we know the Cloud can help with multi-nation or multi-state collaboration efforts. The cloud can help with Application Development (not just tool product development) as well, … Read more

Hackers Find Ways to Attack

It seems to me there is a large disconnect of how a hacker does their work. There are lot of youtube videos with hackers showing how they have hacked something. How can hackers seemingly get in complicated defenses? (not all hackers are criminal in nature)   The following shows some of the combinations within a … Read more

Criminal Hackers Will Find Your Weaknesses

Criminal tattoos – these are the guys attacking us.  The Criminals have multitude of tools at their disposal, just like anybody with technical aptitude does. And just like water flows and creates new channels as it runs downhill the hacker will find your weakness. Because the Hacker Economy is now in the hundreds of millions … Read more

Why Do Constant Vulnerability Analysis?

What can we do to shore up our defenses? If you already have a firewall, an IDS/IPS, an anti-virus software.  Is that all there is to make your network as close to impervious as possible?   I.e. the six sigma security that I have discussed in past blogposts: http://oversitesentry.com/assume-you-are-hacked-so-get-6-sigma-security/ How to test your environment? – … Read more

DARKNET- Know it – Learn it

 also called the “Deepweb” Guess what the IRS was hacked, which actually means we were hacked. http://arstechnica.com/security/2015/05/report-irs-admits-its-been-hacked-tax-info-stolen-for-100000-plus/ In the thousands of breaches all over the world, the criminals are building a dossier data file on all of us that have any PII – Personal Identifiable Information. Addresses (old and new), answers to questions like what … Read more