Quantcast
Channel: ScreamingByte
Browsing all 14 articles
Browse latest View live

Deeper Into Risk

Welcome to my very second article of my year-long series on IAS basics.  Last week, I discussed the basics of risk.  Certainly, there is a lot more information that can be covered here, especially on...

View Article



Signature Analysis

Welcome to the third article of the series.  Last week, I wrapped up by stating that I was going to cover some definitions of devices that comprise different layers of security infrastructure.  After...

View Article

Access Control

This week, I will be very briefly covering access control.  I’ll describe three main classifications for information, and then discuss some control methods that have been used (and are being used) to...

View Article

Skids Beware

Today, I was browsing the internet using certain keywords and I happened to notice a specific search result that grabbed my attention.  I clicked on the link and was absolutely amazed at the amount of...

View Article

Hardening

This week, I want to discuss something very basic, but something that is also a big issue.  Hardening.  We all know we should do it, so why do so many fail to do it?  Whether the day is taken up with...

View Article


Country Blocking

Welcome back to my weekly blog.  I hope you enjoyed your holidays and there are still more to come.  Again, going to keep things short this week.  I want to discuss the importance of firewalls....

View Article

NSA Wiretapping Illegal?

This is something that I’ve been interested in lately.  I would personally love the opportunity to work for the NSA, but they have come under very heavy fire recently.  A lot of accusations are being...

View Article

Emergency Continuity

One very important thing for beginners and students to understand is how emergency policies work together to respond in a time of crisis.  Obviously, risk management is performed to identify the risks...

View Article


Bots, Hacks, and Backdoors

I have spent a large majority of my time as a watcher.  I’ve always been curious to know what other people know.  How hackers managed to pull off some of the things they did and not really risk getting...

View Article


IT Ops vs. Infosec

Walk into any company that needs IT systems and ask random employees what their opinion is of their IT security.  Probably, you’ll hear, more often than not, some very negative voices.  Of course, we...

View Article

Why is the South Korea attack hard to trace?

Why do bank robbers wear masks?  Obviously, they want to hide their identity.  For the most part, this is true of most criminal or legitimate covert activity.  If someone doesn’t want people to know...

View Article

Programming Wetware: Planning for Success

Introduction Modern information security is a powerful tool with some very potent capability to deter and prevent cyber attacks on enterprise networks.  Firewall, VPN, CA, multifactor authentication,...

View Article

NSA Inconsistency

The NSA just published a fact sheet, which you can read here, and here you can find a copy of the FISA order given to Verizon.  What I would like to point out here is that there is an obvious...

View Article


Zimmerman Trial Testimony DDoS’ed

Today, testimony was being heard by a witness via Skype.  Unfortunately, this witness did not have his settings configured to hide his information.  They then sent the feed of the Skype video call over...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images