DDoS not only for disruption
DDoS(distributed Denial of System) means that a number of machines on the Internet are attacking one of your machines, It starts with several machines(“Masters”) being controlled by the “Attacker”, then…
Risk Management Framework
If you had to start over how would you do it? The NIST (National Institute Science Technology) document is a good place to start http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf Publication 800-37 Guide for Applying…
Patching Software “Security” Dilemma
We have a dilemma when deciding how and when to patch the software we depend on. Not all vulnerability patches are built to fix the problems they were set to…
PCI compliance -Security Weakpoints
The criminal hacker is out to get you – The auditors want you to have your paperwork in place. What is the real weak point that we need to focus…
Value of a Hacked Website
http://blog.sucuri.net/ has an interesting post about “The Impacts of a Hacked Website” This is a good line: “We are learning the hard way, what large organizations already learned – being…
