Protecting Windows XP from Exploit
With Microsoft discontinuing support of Windows XP, organizations need guidance on how to protect the legacy machines they can't replace.
With Microsoft discontinuing support of Windows XP, organizations need guidance on how to protect the legacy machines they can't replace.
How to parse the claims vendors make in APT detection.
NetFlow analysis can be an effective way of determining what cloud services are in use and monitoring them for violations.
Thanks to the Grand Rapids chapter of the ISSA for hosting me today. My deck can be downloaded here.
The difficulty in controlling user behavior makes spear phishing a "no-brainer" for attackers. Network surviellance can detect the attack at different parts of the kill chain.
Video presentation from Lawrence Orans of Gartner, describing how Network Behavioral Analysis (NBA/NBAD) can detect advanced, targeted threats.
The last installment of drawing lessons from the Shoe Bombing attack in Network Security is focusing on the actions and response following threat detection.
One thing we learned from the Shoe Bomber, Richard Reid is that not all attackers are the same. In this installment we examine the differences in cyber attackers.
Applying the lessons on surveillance we learned from physical security in stopping the Shoe Bomber to network and informaiton security.
In the second installment of this Network Security 101 series, the differences between attack payloads are examined.