Sweet Security Supercharged

Over the past few years, I have spent quite a bit of time trying to figure out a way to monitor what is happening on my home network in the same way that I have grown accustomed to doing so in an enterprise environment. Not happy with what was available on the market, I chose […]… Read More

The post Sweet Security Supercharged appeared first on The State of Security.

Continue reading Sweet Security Supercharged

WannaCelebrate – How to Protect Against WannaCry Ransomware

Over the past few days, there has been a lot of buzz around the WannaCry ransomware campaign. For those in the trenches dealing with how to address wave after wave of attacks, it’s not as simple as the unhelpful motto of “patch your systems.” Most medium and enterprise businesses cannot trust blindly installing a plethora […]… Read More

The post WannaCelebrate – How to Protect Against WannaCry Ransomware appeared first on The State of Security.

Continue reading WannaCelebrate – How to Protect Against WannaCry Ransomware

Foundational Controls Work – A 2017 DBIR Review

Last week when the 2017 Verizon Data Breach Investigations Report (DBIR) came out, I read through it like I do every year. Each time I go through the report, I challenge myself to find something new and interesting. This year, I was intrigued by the “Things to consider” and “Areas of focus” at the end of […]… Read More

The post Foundational Controls Work – A 2017 DBIR Review appeared first on The State of Security.

Continue reading Foundational Controls Work – A 2017 DBIR Review

Stop the Most Advanced Adversaries

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits. However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest […]… Read More

The post Stop the Most Advanced Adversaries appeared first on The State of Security.

Continue reading Stop the Most Advanced Adversaries

Stop the Most Advanced Adversaries

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits. However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest […]… Read More

The post Stop the Most Advanced Adversaries appeared first on The State of Security.

Continue reading Stop the Most Advanced Adversaries

Is Fileless Malware Really Fileless?

Over the past few weeks I have been seeing quite a few news articles around fileless malware infecting companies around the world. The article from Ars Technica specifically states that the goal of fileless malware is to reside in memory in order to remain nearly invisible. Besides residing in memory, the second aspect of fileless […]… Read More

The post Is Fileless Malware Really Fileless? appeared first on The State of Security.

Continue reading Is Fileless Malware Really Fileless?

Heartbleed Still a Heartache 1,000 Days In

A recent report released by Shodan found that as of January 22, 2017, nearly 200,000 publicly accessible internet devices were vulnerable to Heartbleed. The detailed report gives some insight into those who continue to be exposed to this vulnerability. It’s no surprise that the majority of these systems are HTTPS pages hosted by Apache and […]… Read More

The post Heartbleed Still a Heartache 1,000 Days In appeared first on The State of Security.

Continue reading Heartbleed Still a Heartache 1,000 Days In

Using Fallible Static Code Analysis to Secure Apps

Back in my younger days, I used to create apps for platforms like iOS, Android and yes, even Blackberry. Mostly, this was a hobby to fill a need which was being met by the infant app stores at the time. My primary concern wasn’t security, proper development techniques, or any of the other best practices found […]… Read More

The post Using Fallible Static Code Analysis to Secure Apps appeared first on The State of Security.

Continue reading Using Fallible Static Code Analysis to Secure Apps

How & Why is Ransomware Becoming So Popular?

Organized cybercrime is a business just like any other legitimate business; they want to have low-risk and efficient operations in order to maximize their profits. The main caveat for criminals is that pesky problem of getting caught and spending the rest of your life in jail. Data is the currency of the 21st century – historically, cyber […]… Read More

The post How & Why is Ransomware Becoming So Popular? appeared first on The State of Security.

Continue reading How & Why is Ransomware Becoming So Popular?