An interesting interview with Howard A. Schmidt, former Cybersecurity Advisor for President Obama, from the CIO Network was just posted by the Wall St. Journal. He discusses the steps an organization should take once they realize they have been breached. …..
In my previous post “The Root of All Compromise” input validation was touched on briefly, with links to further information on the subject. In this post I will provide further examples of why using input validation with white-listing is so …..
In warfare, as you modify your defenses, your enemy modifies their tactics. This same process of threat evolution is occurring at a rapid pace in the online world. Warfare is not a new endeavor and old tactics are reused in …..
As the resident, when things go wrong expert, I am constantly asked some of the same basic questions. One of the most common questions is in regards to exactly how a system can be compromised. This is a simplified explanation, …..
When building an incident management capability, the 3P’s, Planning, Preparation, and Practice, are the foundational components of effective incident management. With out all three Ps, costly mistakes will occur, making success difficult at best, and failure almost inevitable. 2014 has …..