The Internet is Broken, Part III: Response
This is the final post in a series about the broken Internet. In the first, we looked at SIEM. Last week, we explored the value of NetFlow analysis. This week, we close with an overview of incident...
View ArticleTwitter hacked. So what’s new?
Twitter reported last week that about 250,000 customers might have had their usernames, email addresses, session tokens, and password hashes stolen. This is just one more instance in which the social...
View ArticleExecutive Order: Improving Critical Infrastructure Security
President Obama issued an executive order (12 Feb 2013) addressing the need for a cybersecurity framework to protect the critical infrastructure of the United States. You can read the order here......
View Article
More Pages to Explore .....