Information Security

May 17, 2013

For those interested in Information Security, there is a LOT of information out there. In addition to the shows, conferences and seminars, there are vendor briefings and webinars, analyst White Papers, industry studies like those from Verizon and Mandiant, websites like Ars Technica and Dark Reading, dozens of blogs by... Read More

May 02, 2013

Insider attacks aren’t new. The very first sysadmin probably didn’t go rogue, but it wasn’t very long after him that the first one did. The reason these are among the most problematic attacks are obvious - these are the most trusted users, who, in order to be able to do... Read More

April 02, 2013

Recent events have caused IT security professionals to reevaluate the way they think about the threat environment.  First, DDoS attacks can go from a minor annoyance to an existential threat, given sufficient compute resources and bandwidth.  Second, state sponsored hacking and espionage is going to be a huge ongoing problem... Read More

March 18, 2013

It is an article of faith that information security is a giant game of cat and mouse, played out on millions of corporate and university networks around the globe.  Hackers, criminals, vandals and thieves seek some kind of technological advantage while the network admins and their InfoSec allies try desperately... Read More