Assuming the breach

“We’ve just traced the attack... its coming from inside the house!” How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail?

Thursday, May 16, 2019

F5 Labs: Application Protection Report 2019, Episode 3: Web Injection Attacks Get Meaner

Application Protection Report 2019, Episode 3: Web Injection Attacks Get Meaner 

 

 

https://www.f5.com/labs/articles/threat-intelligence/application-protection-report-2019--episode-3--web-injection-attacks
Posted by Planet Heidi at 9:38 AM No comments:

F5 Labs: Application Protection Report 2019, Episode 2: 2018 Breach Trends

Application Protection Report 2019, Episode 2: 2018 Breach Trends 

 

https://www.f5.com/content/f5-labs-v2/en/labs/articles/threat-intelligence/application-protection-report-2019--episode-2--2018-breach-trend.html

 

Posted by Planet Heidi at 9:37 AM No comments:

Helpnet Security: CISOs: What would you do over?

Helpnet Security: CISOs: What would you do over?

https://www.helpnetsecurity.com/2019/05/16/ciso-do-over/

Posted by Planet Heidi at 9:35 AM No comments:
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Followers

Popular Posts

  • Internal Vulnerability scanning
    The hardest thing about vulnerability scanning is not the scanning itself. There are literally dozens of pretty decent scanning tools and v...
  • Great blog
    So I stumbled across this blog post the other day and really liked it. If I wasn't so lazy, I'd rewrite it, replacing all the refer...
  • Make your security tools: DLP
    After spending tens of thousands of dollars on commercial security solutions that did not meet our needs, our security team opted for a DIY...
  • Data Driven Security, Part: the Second
    In Part 1, Last time we loaded up 2 years worth of SSH attacks (37,000 entries) into R for analysis. A quick summary command gave us some ...
  • Speaking at "The Cloud and Big Data 2014"
    I'll be enpaneling on "Payment Card Data in the Cloud " Law Seminars International 2-day conference on The Cloud and Big Da...
  • F5 2018 Application Protection Report
    I spent over a year researching, gathering data, discussing, analyzing, designing, and writing this report. It's a complete picture of w...
  • Things used interchangeably that are not
    I keep seeing security "professionals" mixing and matching terms interchangeably that are not.  I can understand this confusion fr...
  • The Spoon Model
    The spoon theory describes the daily life of people with medical conditions and their limited energy resources for doing seemingly everyday...
  • Siracon 2015
    Excited to be presenting at this year's SiraCon in Detroit My talk will be on Third Party Risk Assessment Exposed You hear things like...
  • The "softside" of Security can be the hardest
    I just watched Leigh Honeywell's talk on " Building Secure Cultures " on the YouTubez. (BTW, it is a must watch for anyone rem...

Blog Archive

  • ►  2022 (7)
    • ►  April (1)
    • ►  March (2)
    • ►  January (4)
  • ►  2021 (20)
    • ►  November (1)
    • ►  October (4)
    • ►  July (4)
    • ►  May (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (3)
  • ►  2020 (26)
    • ►  October (3)
    • ►  September (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (3)
    • ►  April (3)
    • ►  March (1)
    • ►  February (6)
    • ►  January (5)
  • ▼  2019 (30)
    • ►  November (7)
    • ►  September (7)
    • ►  June (4)
    • ▼  May (3)
      • F5 Labs: Application Protection Report 2019, Episo...
      • F5 Labs: Application Protection Report 2019, Episo...
      • Helpnet Security: CISOs: What would you do over?
    • ►  February (9)
  • ►  2018 (30)
    • ►  November (4)
    • ►  October (5)
    • ►  August (4)
    • ►  July (1)
    • ►  June (1)
    • ►  May (4)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
    • ►  January (5)
  • ►  2017 (15)
    • ►  December (1)
    • ►  November (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (5)
    • ►  March (3)
    • ►  January (1)
  • ►  2016 (8)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (1)
    • ►  July (1)
  • ►  2015 (8)
    • ►  September (2)
    • ►  June (1)
    • ►  May (4)
    • ►  February (1)
  • ►  2014 (11)
    • ►  December (2)
    • ►  November (1)
    • ►  August (1)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
  • ►  2013 (7)
    • ►  November (1)
    • ►  October (2)
    • ►  August (1)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2012 (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  January (1)
  • ►  2011 (12)
    • ►  December (1)
    • ►  October (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2010 (6)
    • ►  December (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2009 (16)
    • ►  December (2)
    • ►  October (2)
    • ►  September (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (3)
    • ►  January (1)
  • ►  2008 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  June (3)
    • ►  May (7)

Contributors

  • FCB
  • Planet Heidi
Simple theme. Powered by Blogger.