Quantcast
Channel: collective – Anton Chuvakin
Browsing latest articles
Browse All 10 View Live

On Security Data Sharing

It is truly maddening to see examples of bad guys sharing data, tricks, methods and good guys having no effective way of doing it. Moreover, it is considered acceptable to sit on the "hard-earned"...

View Article



More on DoS and Shared Security

Here is something else interesting about Denial of Service defense approaches: you cannot do it alone.  Think about it: it is more profound than it sounds. You can protect from buffer overflows and SQL...

View Article

Essential Processes Around Endpoint Threat Detection & Response Tools

Just as network forensics tools (NFT), SIEM and DLP, Endpoint Threat Detection & Response Tools (ETDR) tools are not of the “deploy-and-forget” variety (far from it!). The tools require a set of...

View Article

Image may be NSFW.
Clik here to view.

On NTP Reflection DDoS: 1990s Strike Back?

Is punch card theft from the mail the only security problem we have solved over the last 50 years? I was really hoping IP spoofing has joined the incredibly short list of security problems we have...

View Article

How to Use Threat Intelligence with Your SIEM?

SIEM and Threat Intelligence (TI) feeds are a marriage made in heaven! Indeed, every SIEM user should send technical TI feeds into their SIEM tool. We touched on that subject several times, but in this...

View Article

Browsing latest articles
Browse All 10 View Live




Latest Images