Hacker Summer Camp
This past week, I had the privilege of attending Black Hat, DEF CON, and BSides Las Vegas. I had a great time, met some incredibly talented people, gave a talk, learned a ton, and reconnected with old...
View ArticleProtecting Against Zero Day Exploits Using Log Management and SIEM
The value of log management for things such as compliance or forensics-based insider threat detection is becoming increasingly recognized throughout the information technology world. But some uses,...
View ArticleNT & 2000. You’ll need more than a pocketful of posies…
Trust. The internet simply can’t afford it. I’m not talking about notional trust, or any form of technical trust. I’m talking about actual trust. Users of the internet can do without it. Why the...
View ArticleFIM for Fonts: Using file integrity monitoring to protect against hidden threats
Almost everybody uses antivirus. Chances are that you have an antivirus running right now on the computer you are using to read this article. Antivirus is great – it gives us that warm, cozy, and...
View Article
More Pages to Explore .....