Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'TaoSecurity' | www.SecurityPhresh.com
Security News from 'TaoSecurity'
Showing 'Security News from 'TaoSecurity'' from 11 to 20
The Origin Of The Quote There Are Two Types Of Companies
18th Dec 2018 [4 months ago] from TaoSecurity
While listening to a webcast this morning, I heard the speaker mentionThere are two types of companies: those who have been hacked, and those who don’t yet know they have been hacked.He credited Cisco CEO John Chambers but didnt provide...
The Origin Of The Term Indicators Of Compromise (IOCs)
25th Nov 2018 [5 months ago] from TaoSecurity
I am an historian. I practice digital security, but I earned a bachelors of science degree in history from the United States Air Force Academy. (1)Historians create products by analyzing artifacts, among which the most significant is the...
More On Threat Hunting
23rd Nov 2018 [5 months ago] from TaoSecurity
Earlier this week hellor00t asked via Twitter:Where would you place your security researchers/hunt team?I replied:For me, "hunt" is just a form of detection. I dont see the need to build a "hunt" team. IR teams detect intruders using two...
Cybersecurity And Class M Planets
2nd Nov 2018 [6 months ago] from TaoSecurity
I was considering another debate about appropriate cybersecurity measures and I had the following thought: not all networks are the same. Profound, right? This is so obvious, yet so obviously forgotten.Too often when confronting a proposed...
Have Network, Need Network Security Monitoring
25th Oct 2018 [6 months ago] from TaoSecurity
I have been associated with network security monitoring my entire cybersecurity career, so I am obviously biased towards network-centric security strategies and technologies. I also work for a network security monitoring company (Corelight),...
Network Security Monitoring Vs Supply Chain Backdoors
5th Oct 2018 [7 months ago] from TaoSecurity
On October 4, 2018, Bloomberg published a story titled “The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies,” with a subtitle “The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple,...
Firewalls And The Need For Speed
18th Sep 2018 [7 months ago] from TaoSecurity
I was looking for resources on campus network design and found these slides(pdf) from a 2011 Network Startup Resource Center presentation. These two caught my attention:This bothered me, so I Tweeted about it.This started some discussion,...
Twenty Years Of Network Security Monitoring: From The AFCERT To Corelight
11th Sep 2018 [7 months ago] from TaoSecurity
I am really fired up to join Corelight. I’ve had to keep my involvement with the team a secret since officially starting on July 20th. Why was I so excited about this company? Let me step backwards to help explain my present situation,...
Defining Counterintelligence
22nd Jul 2018 [9 months ago] from TaoSecurity
Ive written about counterintelligence(CI) before, but I realized today that some of my writing, and the writing of others, may be confused as to exactly what CI means.The authoritative place to find an American definition for CI is the...
Why Do SOCs Look Like This?
28th Jun 2018 [10 months ago] from TaoSecurity
When you hear the word "SOC," or the phrase "security operations center," what image comes to mind? Do you think of analyst sitting at desks, all facing forward, towards giant screens? Why is this?The following image is from the outstanding...
« Newer 1 2 3 4 Older »