Part 1: Solving the Honeypot Dilemma: Countering: Dormant Threats Inside Your Agency’s Networks

6/10

Part 1: Solving the Honeypot Dilemma: Countering: Dormant Threats Inside Your Agency’s Networks

RSAC Recap:  Two Sessions That Made Me Think

5/22

RSAC Recap:  Two Sessions That Made Me Think

At the recent RSA Conference 2015, I attended some fascinating meetings and sessions filled with valuable insights. Here are two of them whose presentation slides are available for PDF download:

Hacking Exposed: Beyond the Malware

There’s a Dirty Little Secret of Virtual Appliances

1/16

There’s a Dirty Little Secret of Virtual Appliances

Nearly all innovative products start as appliances.  There are many good reasons for this, but two stand out.  One is that an appliance controls the environment the product has to live in.  This saves a significant amount of quality assurance testing against multiple different types of environments, but more importantly ensures that the product has the right blend of resources to perform as expected.  

Phishing over the phone?

1/8

Phishing over the phone?

The other day I got a call from a man who, in broken English, said to me, “You are being hacked right now!”

I knew right away what this was, but I thought I’d play it out a bit.  I said, “Right now?  As we’re talking?”

“Of course, yes,” he said, claiming he worked for “Microsoft Windows” and that my PC was sending him alerts about a hacker in my system.  I kept asking questions about who he worked for and he kept repeating “Windows Support,” after first having said he worked for Microsoft Windows.

Tackling the BYOD and Rogue Application Challenge

9/18

Tackling the BYOD and Rogue Application Challenge

In today’s world, smart devices and great new applications are everywhere.  Along with making our lives easier, they make the lives of security admins and chief information security officers (CISOs) a nightmare.  To state the issue in laymen’s terms: BYOD policy and rogue applications are akin to the Trojan horse inside the sophisticated network perimeter defenses. 

Newer Articles