Assuming the breach

“We’ve just traced the attack... its coming from inside the house!” How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail?

Friday, November 23, 2018

Helpnet Security: Don’t accept risk with a pocket veto

Don’t accept risk with a pocket veto

https://www.helpnetsecurity.com/2018/11/23/dont-accept-risk/

 

Posted by Planet Heidi at 5:34 AM 1 comment:

Tuesday, November 20, 2018

F5 Labs: Five Steps to Fencing In the IoT Threat


Five Steps to Fencing In the IoT Threat 

 



https://www.f5.com/labs/articles/cisotociso/five-steps-to-fencing-in-the-iot-threat
Posted by Planet Heidi at 10:25 AM No comments:

F5 Labs: 2018 Phishing and Fraud Report: Attacks Peak During the Holidays

2018 Phishing and Fraud Report: Attacks Peak During the Holidays 

 

https://www.f5.com/labs/articles/threat-intelligence/2018-phishing-and-fraud-report--attacks-peak-during-the-holidays

 

Posted by Planet Heidi at 10:24 AM No comments:

F5 Labs: Build Defense in Depth with Dissimilar Protections

Build Defense in Depth with Dissimilar Protections 

 

https://www.f5.com/labs/articles/cisotociso/build-defense-in-depth-with-dissimilar-protections

 

Posted by Planet Heidi at 10:23 AM No comments:
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Followers

Popular Posts

Blog Archive

  • ►  2022 (7)
    • ►  April (1)
    • ►  March (2)
    • ►  January (4)
  • ►  2021 (20)
    • ►  November (1)
    • ►  October (4)
    • ►  July (4)
    • ►  May (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (3)
  • ►  2020 (26)
    • ►  October (3)
    • ►  September (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (3)
    • ►  April (3)
    • ►  March (1)
    • ►  February (6)
    • ►  January (5)
  • ►  2019 (30)
    • ►  November (7)
    • ►  September (7)
    • ►  June (4)
    • ►  May (3)
    • ►  February (9)
  • ▼  2018 (30)
    • ▼  November (4)
      • Helpnet Security: Don’t accept risk with a pocket ...
      • F5 Labs: Five Steps to Fencing In the IoT Threat
      • F5 Labs: 2018 Phishing and Fraud Report: Attacks P...
      • F5 Labs: Build Defense in Depth with Dissimilar Pr...
    • ►  October (5)
    • ►  August (4)
    • ►  July (1)
    • ►  June (1)
    • ►  May (4)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
    • ►  January (5)
  • ►  2017 (15)
    • ►  December (1)
    • ►  November (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (5)
    • ►  March (3)
    • ►  January (1)
  • ►  2016 (8)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (1)
    • ►  July (1)
  • ►  2015 (8)
    • ►  September (2)
    • ►  June (1)
    • ►  May (4)
    • ►  February (1)
  • ►  2014 (11)
    • ►  December (2)
    • ►  November (1)
    • ►  August (1)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
  • ►  2013 (7)
    • ►  November (1)
    • ►  October (2)
    • ►  August (1)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2012 (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  January (1)
  • ►  2011 (12)
    • ►  December (1)
    • ►  October (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2010 (6)
    • ►  December (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2009 (16)
    • ►  December (2)
    • ►  October (2)
    • ►  September (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (3)
    • ►  January (1)
  • ►  2008 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  June (3)
    • ►  May (7)

Contributors

  • FCB
  • Planet Heidi
Simple theme. Powered by Blogger.