2014: The Year Our Trust in Information Protection Collapsed
Between setting up Security Architects Partners as a new consulting business and working two big contracts, I wasn’t sure I’d have time for a New Year’s review. Happily, my colleague Dr. Fred Cohen has made it easy for me by… Continue reading
Sony Hack: Just Another Privilege Escalation?
Concerning Sony, Sanjay Tandon writes that, “in all likelihood, what happened here is that malicious perpetrators gained administrative access within Sony’s network, and used it to obtain access to whatever they wished to obtain access.” In his Cyber… Continue reading
Turkish Pipeline Attack – The Hour is Later Than You Think
The alleged attack on the Baku-Tbilisi-Ceyhan (BTC) pipeline has it all: geopolitical and ethnic conflict, potential nation state or terrorist involvement, environmental and economic disaster potential. Is is said to be comparable in destructive effect to Shamoon… Continue reading
The Sandbox Wars, They Have Begun
Since writing “What’s in the Sandbox?” I’ve been waiting for the sandbox shootout: “Zscaler vs FireEye – Insights from the experts at Miercom Labs.” Now its here: According to Miercom Zscaler is… Continue reading
Security Governance (Part 2): Operating the Matrix
At the root of many consulting engagements we find a security governance problem. Last week, in Part 1 of this series, I described the centralized, decentralized and matrixed primitives of security governance. I published the matrixed security governance… Continue reading
The Internet of (Vulnerable) Things
What is it about IoT? I keep coming up with new acronyms:
- IOPT:… Continue reading