Is Your Cyber Risk Manageable?
Have you done everything you could to manage the level of risk that you need to have? On Feb 4th I said Risk Management failed us: http://oversitesentry.com/risk-management-does-not-work/ So how can…
Defend Your Systems
Discussion of public breaches of security
Have you done everything you could to manage the level of risk that you need to have? On Feb 4th I said Risk Management failed us: http://oversitesentry.com/risk-management-does-not-work/ So how can…
What if you could block all China originating traffic? As you see there was a Forbes Internet attack survey done for Q2 2014. China was the top source of attack…
Yes another slightly new style of attack: http://www.networkworld.com/article/2889933/hackers-exploit-router-flaws-in-unusual-pharming-attack.html There are a couple of slightly new twists in this hacker style attack. Proofpoint found the attack (as a spam protection company…
It seems everyone should be looking for Command and Control traffic from inside the network (updated on 04/01/2016) What does Command and Control mean? It is the last process in…
We know the problems with the Anthem Breach: no encryption But does it mean you should encrypt your data? What does it mean to “encrypt the data” What if your…