On Security Data Sharing
It is truly maddening to see examples of bad guys sharing data, tricks, methods and good guys having no effective way of doing it. Moreover, it is considered acceptable to sit on the "hard-earned"...
View ArticleMore on DoS and Shared Security
Here is something else interesting about Denial of Service defense approaches: you cannot do it alone. Think about it: it is more profound than it sounds. You can protect from buffer overflows and SQL...
View ArticleEssential Processes Around Endpoint Threat Detection & Response Tools
Just as network forensics tools (NFT), SIEM and DLP, Endpoint Threat Detection & Response Tools (ETDR) tools are not of the “deploy-and-forget” variety (far from it!). The tools require a set of...
View ArticleOn NTP Reflection DDoS: 1990s Strike Back?
Is punch card theft from the mail the only security problem we have solved over the last 50 years? I was really hoping IP spoofing has joined the incredibly short list of security problems we have...
View ArticleHow to Use Threat Intelligence with Your SIEM?
SIEM and Threat Intelligence (TI) feeds are a marriage made in heaven! Indeed, every SIEM user should send technical TI feeds into their SIEM tool. We touched on that subject several times, but in this...
View Article
More Pages to Explore .....