Another interesting article from ThreatPost, which highlights a problem faced by many of us. TLS/SSL implementation is something which often taken for granted. It is one of the most misunderstood aspects of security. Like firewalls, […]
Month: October 2012
Mapping Cyber Attacks
This stood out on Slashdot: HoneyMap displays information in real-time about current ongoing bot attacks against honey pot machines running on secure virtual machines. Looks amazing and shows the extent of the problem.
Don’t call me Shirley!
The other day someone came into my office and asked: “Why should I have to validate the web form input at the web server? Surely it better to do it in the browser!” *Humph!* “I […]
The Language of Risk
I recently had my eyes opened. It happens every now and then. During a conversation with my friend Seth Bromberger he introduced his Quantitative Threat Methodology. I’m hooked. Why? Well: Its simple and it works. Its […]