Its not that we don’t care about Security
Does this sound familiar? My company does what it can with security and is compliant, we have no breaches so far. The problem is that the security team knows we…
Your Firewall Logs: Most Important Tool?
If set up correctly your Firewall logs will tell you what is most important about your network, your employees, any trojans or viruses that are running in your network, etc.…
Digital Anything is at Risk – Fingerprints & more
Office Personnel Managment hack now suspected also of stealing fingerprint data. http://www.nationaljournal.com/tech/2015/07/14/How-Much-Damage-Can-OPM-Hackers-Do-With-Million-Fingerprints What can be done with a stolen fingerprint? Is it really only a foreign government coup? Can the…
Security Triangle+ People Process Technology+
As other blog posts have mentioned in the past: Schneier: https://www.schneier.com/blog/archives/2013/01/people_process.html http://www.computerweekly.com/blogs/david_lacey/2013/01/we_need_more_use_of_security_t.html Here is the “Security Triangle” People, Process, and Technology. Image from: http://www.business2community.com/online-communities/social-intranets-merging-people-process-and-technology-0126252 Even though the image above is…
Why is Security Difficult? Target Breach Analysis 2 Yrs Later
Brian Krebs does a great job reviewing the details at his latest post http://krebsonsecurity.com/2015/09/inside-target-corp-days-after-2013-breach/#more-32276 The analysis of Target’s breach is obvious in the level of insecurity in Target 2012. Default…
