Network Security School of Fort Knox: Part 2
In this second installment we look at the difference between signature and behavioral detection schools.
In this second installment we look at the difference between signature and behavioral detection schools.
The beginning of a six part series on how to approach network security. This installment covers the importance of perimeter defense.
Pornographic and piracy sites are no longer the haven for malware they once were. You might be surprised to learn that blogs (like this one) are where you are most likely to get infected.
When rules restrain retaliation against inappropriate behavior lesser men are able to gain an advantage over greater men. I retell a story of how I tormented an honorable Marine that was ham-stringed by regulation and how the lessons I learned that night in a New Orleans bar can teach us something on when we should strike back against cybercriminals and state sponsored attacks.The Pentagon is currently seeking permission to strike against attackers and I explain why I support the proposal.
Password Day comes but twice a year and this year I've added a couple of new traditions to the celebration. I've crumbled and started using password management and am giving SMS authentication a whirl.