Blog

Security Intelligence – Think Outside the Logs

Published on June 12, 2013

We often consider our security posture and architecture with an eye to the threat environment. We look outside, and try to determine what we are defending against. Even in the case of insider threats, we are often trying to develop the defenses in terms of the attack vectors, vulnerabilities and...

Edward Snowden – The Ultimate Insider Threat

Published on June 10, 2013

Edward Snowden is a IT contractor, a SysAdmin employed by Booz Allen to provide Systems services to the US Intelligence Agencies. In this sense, he is just a face in the crowd, part of a small army of private-sector contractors helping the US government run its day-to-day operations. But as...

(Security) Intelligence is Power

Published on June 6, 2013

In the last year or so, we’ve seen significant growth in attacks on web servers, as opposed to the more traditional attacks on individual users. The instigators of these attacks use the higher levels of available bandwidth and processor power to unleash particularly effective DDoS attacks against banks and other...

Security Intelligence – Words with Actual Meaning

Published on May 30, 2013

It won’t come as breaking news I’m sure, but technology marketing professionals have an insatiable appetite for hot buzzwords and trendy terms. It’s easy to understand, I suppose - when a particular concept starts breaking out of tech forums and into mainstream editorial, it’s a tremendous opportunity to capitalize on...

State of Information Security – What we don’t know is KILLING us

Published on May 17, 2013

For those interested in Information Security, there is a LOT of information out there. In addition to the shows, conferences and seminars, there are vendor briefings and webinars, analyst White Papers, industry studies like those from Verizon and Mandiant, websites like Ars Technica and Dark Reading, dozens of blogs by...

Candid Camera, Threats from the inside and Beyond

Published on May 15, 2013

Those of us of a certain age can remember very well when the first webcam went online. It was pointed at the coffee pot at a computer science lab within Cambridge University, and provided a simple method for employees to determine if the pot was empty before walking down the...

Upgrade Your Information Security

Published on May 10, 2013

Upgrades or lack there of, a major concern for information security operations Systems and network administration is an endless balancing act.  On the one hand, availability, stability and performance are paramount concerns, while adding functionality and security are less well understood demands outside the IT organization.  Everyone has felt the...

Inside Out

Published on May 2, 2013

Insider attacks aren’t new. The very first sysadmin probably didn’t go rogue, but it wasn’t very long after him that the first one did. The reason these are among the most problematic attacks are obvious - these are the most trusted users, who, in order to be able to do...

Technological Problems, Technological Solutions

Published on April 29, 2013

We’ve seen it countless times over the years. Someone will speak up in a meeting, saying something to the effect of “not all problems have technological solutions - just throwing more technology at it may not be the best option”. They say it because it’s self-evidently true, but also because...

May You Live in Interesting Times

Published on April 25, 2013

It’s not exactly news.  For years, the conventional wisdom has been that hackers out of Russia and Eastern Europe were criminals, intent on stealing money by way of fraud and extortion, and hackers out of mainland China were mostly focused on industrial espionage, stealing trade secrets and intellectual property on...

What (Who) is in Your Network?

Published on April 2, 2013

Recent events have caused IT security professionals to reevaluate the way they think about the threat environment.  First, DDoS attacks can go from a minor annoyance to an existential threat, given sufficient compute resources and bandwidth.  Second, state sponsored hacking and espionage is going to be a huge ongoing problem...

The Best Defense…

Published on March 29, 2013

"Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat." ― Sun Tzu, The Art of War Despite all the facile metaphors in common usage, the “battle” between information security professionals and their various opponents, hackers and thieves in particular, can not in...