FIM: A Proactive and Reactive Defense against Security Breaches

No matter how well-designed it is, a security program will never prevent every digital attack. But an assault need not escalate into a data breach. Organizations can reduce the likelihood of a major incident by investing in key security controls. One such fundamental security component is FIM. Short for “file integrity monitoring“, FIM helps organizations […]… Read More

The post FIM: A Proactive and Reactive Defense against Security Breaches appeared first on The State of Security.

Continue reading FIM: A Proactive and Reactive Defense against Security Breaches

Rich Mogull, Releases Tour d’ Force Endpoints Thought Piece

tidal forces figure one.gif

While not nearly as forceful and ‘tidal-like’ as evidenced in the tidal forces first-year physics diagram above, Rich Mogull (of Securosis fame) has released the second post in a typically erudite series appropriately titled ‘Tidal Forces: Endpoints Are Different—More Secure, and Less Open‘ (the first series post is available here). The Securosis Team’s latest output is most certainly todays’ Must Read.

Permalink

Continue reading Rich Mogull, Releases Tour d’ Force Endpoints Thought Piece

Quasimotor? A Robot Bell Ringer

In large churches that still use real bells in their bell towers, a large number of them ring bells using a method called full circle ringing. In order to get the bells to sound at exactly the right time, the bells are rung by swinging the entire bell in an almost complete 360-degree arc. This helps to mitigate the fact that often times, the bells weigh more than the person ringing the bells. However, if you don’t have access to a belfry, you can practice ringing bells using this method with your own full circle bell simulator.

The frame for …read more

Continue reading Quasimotor? A Robot Bell Ringer

5 Tips for Detecting Suspicious Changes in Your Network

In a world where we must assume our enterprises have already been breached, monitoring the perimeter is too little, too late. Continuous monitoring, a la CDM, tells you where you are vulnerable and what to fix, but not where you are already bleeding. In my post on why change detection is so important, I talked about […]… Read More

The post 5 Tips for Detecting Suspicious Changes in Your Network appeared first on The State of Security.

Continue reading 5 Tips for Detecting Suspicious Changes in Your Network