Why Cybersecurity problems?

To answer why Cybersecurity? we must discuss how software is being developed. There are traditional software methods (also called waterfall) from  the following site: http://www.umsl.edu/~hugheyd/is6840/waterfall.html I always like to break down waterfall in the following: Pseudocode Design Develop Test Customer has it – needs any bug fixes must be fixed. Did you notice a lack of … Read more

#Cyberjoke v1.7 Friday

beartales.me      “Another hacker” Joke #449 at Al’s Cyberjoke 3000 website Two computer programmers met in the park. One said, “New bike?” “Yep.” “Nice. How much did it cost you?” “Nothing!” “Nothing? How can that be?” “Well, you see, yesterday a gorgeous woman rode up to me on this bike, took off all her … Read more

VLAN Hopping Defeats Segmentation

When we set up a Network we segment the network. The firewall protects the inside network, and the inside network critical systems are separated from the rest of the devices. Also for compliance reasons one needs to segment networks.   So the hacker wants to see all the computers… (how?) VLAN hopping. http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf This is … Read more

You Don’t Understand Hackers or Computers? Hackers Will Still Hack You

Yes we(humans) are Risk seeking  with losses, and risk averse with gains. https://www.schneier.com/essays/archives/2008/01/the_psychology_of_se.html “Security is a tradeoff,” Schneier said, speaking to a packed audience at his RSA session. “What are you getting for what you’re giving up? Whether you make that tradeoff consciously or not, there is one.” You think that your computers are not … Read more

We are Hacked – Firewall Useless – Now What?

Why did we get hacked?  Is a common refrain after a breach. Thousands of businesses got hacked last year (and this year) as in my previous post: http://oversitesentry.com/analyzing-data-breaches-can-we-tolerate-status-quo/ We believe in our technologies, in automation in firewalls There are many aspects of potential weakness – and all weaknesses will be taken advantage of. The only way … Read more