Quick Hits
Commentary
News
News
News
Quick Hits
Commentary
Quick Hits

News
Quick Hits
Commentary
Quick Hits
News
News
Quick Hits
News
News
As promised, here's my blog on CISO reporting structures at F5 Labs
F5 Labs - Who Should the CISO Report To
In reply to: Who should the CSO report to
I think Orbot VPN is also useful app for protecting security https://privatoria.net/blog/orbot-vpn/
In reply to: Orbot VPN
I think this was a misplaced view into the issues facing enterprise security. This onus should be placed on the rest of the company - period. This is 2017 and we should never hear the phrase "We gave them training...
In reply to: Misplaced analysis
Always great to find new tools or techniques to look into. Thank you for sharing this information.
In reply to: Thanks for sharing
I think the concern over the disparity between the practitioner priorities and those of top management in their organizations is probably one of the most relevant of the survey and it denotes a misalignment between business...
In reply to: Disparity in priorities
Just curious of how a malware attack would affect an active-active DR scenario. If the malware can infect a primary target, I would think it would affect the backup environment. And what would this do to the...
In reply to: What about replicated COOP scenarios
That was an really impressive post and i like that.
192.168.0.1
https://19216801.mobi/
In reply to: Re: A Quarter Right.
Execute candymountain.sh as the root user, Charlie!
In reply to: Caption
Related: Attacks against connected pacemakers (as seen in Homeland; indeed, it was for this reason that VP Dick Cheney's pacemaker connectivity was disabled).Nearly four years ago, cybersecurity firm predicted...
In reply to: Hurtables
I think the same, the intelligence sharing can really help some poor countries, so i support it.
In reply to: Social Media">Re: Comment: Social Media
The 'breach' (in its broadest sense) figures are climbmg inexorable despite all the talk and flannel os vendors and consultants. It is like fixng rust spots on a rust bucket car whre as soon as you fix one, another appears....
In reply to: Re:Breaches over Next 2 Years
Latest Comment: Execute candymountain.sh as the root user, Charlie!
Security Operations and IT Operations: Finding the Path to CollaborationA wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.