What You Need to Know about the Big 3 Protocols
When someone upstream messes with BGP, DNS or SMTP, you and your users are going to have a bad day. Continue reading What You Need to Know about the Big 3 Protocols
Collaborate Disseminate
When someone upstream messes with BGP, DNS or SMTP, you and your users are going to have a bad day. Continue reading What You Need to Know about the Big 3 Protocols
When it comes to data exfiltration, if something doesn’t look right, it probably isn’t. Continue reading 25 Signs of Data Exfiltration
When "work" can happen in any place, security breaches can happen any time and any way. Continue reading How to Keep Data, Devices Secure When Mobile Is the Norm
IT pros slammed again and again by security breaches can become desensitized–or they can gain strength from the experiences. Continue reading Security Scar Tissue Can Make Organizations Smarter and Stronger
Win XP may still be lurking in your organization. Here’s where you might find it and how to go about securing Windows XP. Continue reading Tips for Securing Windows XP (Yes, Win XP)
Canonical’s announcement that Ubuntu long term support will span a decade must be considered in the context of hardware, the cloud and CI/CD. Continue reading Ubuntu Long Term Support Announcement Begs Security Questions
Linux container technology introduces several pathways through which cryptojackers can stealthily do their work. Continue reading How to Get Ahead of Container Cryptojacking
Nozomi’s SCADAguardian uses deep packet inspection against tables of known malware behavior, as well as pattern recognition and relationship observations. Continue reading Deep Packet Inspection Powers New Industrial Systems Security Tool
Quantum computers are currently extremely expensive, not very capable, and very few people know how to program them in a meaningful way. Continue reading Quantum Computing Doesn’t Threaten Good Encryption–Yet
In this article I explore geoblocking best practices based on my own experience using honeypot servers. Continue reading Geoblocking Best Practices: When Geoblocking Is (and Isn't) Useful