Assuming the breach

“We’ve just traced the attack... its coming from inside the house!” How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail?

Friday, November 23, 2018

Helpnet Security: Don’t accept risk with a pocket veto

Don’t accept risk with a pocket veto

https://www.helpnetsecurity.com/2018/11/23/dont-accept-risk/

 

Posted by Planet Heidi at 5:34 AM 1 comment:

Tuesday, November 20, 2018

F5 Labs: Five Steps to Fencing In the IoT Threat


Five Steps to Fencing In the IoT Threat 

 



https://www.f5.com/labs/articles/cisotociso/five-steps-to-fencing-in-the-iot-threat
Posted by Planet Heidi at 10:25 AM No comments:

F5 Labs: 2018 Phishing and Fraud Report: Attacks Peak During the Holidays

2018 Phishing and Fraud Report: Attacks Peak During the Holidays 

 

https://www.f5.com/labs/articles/threat-intelligence/2018-phishing-and-fraud-report--attacks-peak-during-the-holidays

 

Posted by Planet Heidi at 10:24 AM No comments:

F5 Labs: Build Defense in Depth with Dissimilar Protections

Build Defense in Depth with Dissimilar Protections 

 

https://www.f5.com/labs/articles/cisotociso/build-defense-in-depth-with-dissimilar-protections

 

Posted by Planet Heidi at 10:23 AM No comments:
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Followers

Popular Posts

  • Great blog
    So I stumbled across this blog post the other day and really liked it. If I wasn't so lazy, I'd rewrite it, replacing all the refer...
  • Internal Vulnerability scanning
    The hardest thing about vulnerability scanning is not the scanning itself. There are literally dozens of pretty decent scanning tools and v...
  • Make your security tools: DLP
    After spending tens of thousands of dollars on commercial security solutions that did not meet our needs, our security team opted for a DIY...
  • Data Driven Security, Part: the Second
    In Part 1, Last time we loaded up 2 years worth of SSH attacks (37,000 entries) into R for analysis. A quick summary command gave us some ...
  • Speaking at "The Cloud and Big Data 2014"
    I'll be enpaneling on "Payment Card Data in the Cloud " Law Seminars International 2-day conference on The Cloud and Big Da...
  • F5 2018 Application Protection Report
    I spent over a year researching, gathering data, discussing, analyzing, designing, and writing this report. It's a complete picture of w...
  • Things used interchangeably that are not
    I keep seeing security "professionals" mixing and matching terms interchangeably that are not.  I can understand this confusion fr...
  • The Spoon Model
    The spoon theory describes the daily life of people with medical conditions and their limited energy resources for doing seemingly everyday...
  • Siracon 2015
    Excited to be presenting at this year's SiraCon in Detroit My talk will be on Third Party Risk Assessment Exposed You hear things like...
  • The "softside" of Security can be the hardest
    I just watched Leigh Honeywell's talk on " Building Secure Cultures " on the YouTubez. (BTW, it is a must watch for anyone rem...

Blog Archive

  • ►  2022 (7)
    • ►  April (1)
    • ►  March (2)
    • ►  January (4)
  • ►  2021 (20)
    • ►  November (1)
    • ►  October (4)
    • ►  July (4)
    • ►  May (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (3)
  • ►  2020 (26)
    • ►  October (3)
    • ►  September (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (3)
    • ►  April (3)
    • ►  March (1)
    • ►  February (6)
    • ►  January (5)
  • ►  2019 (30)
    • ►  November (7)
    • ►  September (7)
    • ►  June (4)
    • ►  May (3)
    • ►  February (9)
  • ▼  2018 (30)
    • ▼  November (4)
      • Helpnet Security: Don’t accept risk with a pocket ...
      • F5 Labs: Five Steps to Fencing In the IoT Threat
      • F5 Labs: 2018 Phishing and Fraud Report: Attacks P...
      • F5 Labs: Build Defense in Depth with Dissimilar Pr...
    • ►  October (5)
    • ►  August (4)
    • ►  July (1)
    • ►  June (1)
    • ►  May (4)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
    • ►  January (5)
  • ►  2017 (15)
    • ►  December (1)
    • ►  November (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (5)
    • ►  March (3)
    • ►  January (1)
  • ►  2016 (8)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (1)
    • ►  July (1)
  • ►  2015 (8)
    • ►  September (2)
    • ►  June (1)
    • ►  May (4)
    • ►  February (1)
  • ►  2014 (11)
    • ►  December (2)
    • ►  November (1)
    • ►  August (1)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
  • ►  2013 (7)
    • ►  November (1)
    • ►  October (2)
    • ►  August (1)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2012 (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  January (1)
  • ►  2011 (12)
    • ►  December (1)
    • ►  October (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2010 (6)
    • ►  December (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2009 (16)
    • ►  December (2)
    • ►  October (2)
    • ►  September (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (3)
    • ►  January (1)
  • ►  2008 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  June (3)
    • ►  May (7)

Contributors

  • FCB
  • Planet Heidi
Simple theme. Powered by Blogger.