What I got out of BlackHat and DEFCON
First I must say I did not go to Las Vegas, all I did is hunt the Internet for pieces of information and did not copy completely, but edited to…
Risk Analysis Gone Wrong?
Since a picture says a thousand words here is an attempt at explanation of Risk Analysis. The rows are “Impact on Environment”: none, minimal, minor, significant, major, critical The “Likelihood”…
Compliance vs Framework
Is it better to focus on compliance or a on a framework system? I.e. PCI or HIPAA compliance versus ITIL or COBIT for example. There are more regulations coming so…
Threat Hunting in Your Network
We should hunt for threats in our network – i.e. find possible attacks in our network to see what is being attacked and whether we can start to counter the…
Why Are Hackers Successful?
The Number 1 reason is: “We do not do an adequate job of patching and paying attention to security!” Again and again we can find reports and stories of entities…
