Quantcast
Channel: Editorials
Browsing latest articles
Browse All 12 View Live

Afterbytes: Chinese Academics Paper on Cyberwar Sets Off Alarms in U.S.

The article: Chinese Academics Paper on Cyberwar Sets Off Alarms in U.S.:Larry M. Wortzel, a military strategist and China specialist, told the House Foreign Affairs Committee on March 10 that it...

View Article



Treating Software as a Strategic Technology

Lately I've been thinking a lot about the problem of software security - "lately" being the last 15 years of my life, give or take. It seems to be a topic that's perennially on the horizon, because...

View Article

Image may be NSFW.
Clik here to view.

Vulnerabilities, Exploits, and Good Dental Hygiene

Vulnerability ManagementConstantly assessing the security of your own systems is an important task in maintaining a secure network. I relate regular security assessments to personal hygiene, such as...

View Article

Do Passwords Matter?

Password Breaches Are Nothing NewYou don't have to look very hard to find an article discussing password breaches. Recently, there was a lot of buzz around LinkedIn, LastFM, and eHarmony, three very...

View Article

Are You at Risk for Burnout? The Top Causes…and a Sneak Peek at Findings from...

Around the time of RSA in February, I wrote about the risk of burnout for security professionals, and offered some warning signs — including feelings of stress, exhaustion, or a lack of self-efficacy —...

View Article


If a Security Control Falls in the Forest...

Many guidelines and compliance standards state that in order to be "secure" or "compliant" all of your systems must be patched. Turns out that this is easier said than done. Just when you believe your...

View Article

Black Hat 2012

Conferences Fuel Your PassionFew things spark your passion for information security the same way as a conference. It’s inspiring to talk to so many different people in the industry and listen to a...

View Article

Image may be NSFW.
Clik here to view.

Default Credentials: Low-hanging Fruit in the Enterprise

Passwords are Like Underwear, and It's Laundry DayPerhaps one of the most easily overlooked security problems in the industry is password security. I'm not referring to the stored end-user password...

View Article


We have Microsoft Tuesday, so how long until we have Indicator Wednesday?

Recently, Tenable's Research team created Nessus checks and log searches to look for indicators specified in the Mandiant APT1 report. Our response was not unlike a typical Microsoft Tuesday afternoon...

View Article


Comments and Commenting Policy

I believe that one of the things that gives a blog life and interest is its commentariat. This is not a free-for-all zone, however, so comments are moderated (for appropriateness, spam blocking, etc)....

View Article

The Big Red Button and the Kill Switch

I have no idea if I had a role in the "Internet Kill Switch" debacle, but it's possible that I was one of the pushes that got that particularly horrible ball rolling. Back in 2002, when I was between...

View Article

FUDwatch: Armenia

For a field that loves statistics, computer security sure treats them casually. In order to get my humble BA in Psychology, I absorbed my share of course hours in statistics and testing methods,...

View Article
Browsing latest articles
Browse All 12 View Live


Latest Images