Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'TaoSecurity' | www.SecurityPhresh.com
Security News from 'TaoSecurity'
Showing 'Security News from 'TaoSecurity'' from 1 to 10
Happy 16th Birthday TaoSecurity Blog
8th Jan 2019 [15 days ago] from TaoSecurity
Today, 8 January 2019, is TaoSecurity Blogs 16th birthday! This is also my 3,041st blog post.I wrote my first post on 8 January 2003 while working as an incident response consultant for Foundstone.Here are a few statistics on the blog....
Notes On Self-Publishing A Book
31st Dec 2018 [23 days ago] from TaoSecurity
In this post I would like to share a few thoughts on self-publishing a book, in case anyone is considering that option.As I mentioned in my post onburnout, one of my goals was to publish a book on a subject other than cyber security. A...
Managing Burnout
21st Dec 2018 [one month ago] from TaoSecurity
This is not strictly an information security post, but the topic likely affects a decent proportion of my readership.Within the last few years I experienced a profound professional "burnout." Ive privately mentioned this to colleagues in...
The Origin Of The Quote There Are Two Types Of Companies
18th Dec 2018 [one month ago] from TaoSecurity
While listening to a webcast this morning, I heard the speaker mentionThere are two types of companies: those who have been hacked, and those who don’t yet know they have been hacked.He credited Cisco CEO John Chambers but didnt provide...
The Origin Of The Term Indicators Of Compromise (IOCs)
25th Nov 2018 [2 months ago] from TaoSecurity
I am an historian. I practice digital security, but I earned a bachelors of science degree in history from the United States Air Force Academy. (1)Historians create products by analyzing artifacts, among which the most significant is the...
More On Threat Hunting
23rd Nov 2018 [2 months ago] from TaoSecurity
Earlier this week hellor00t asked via Twitter:Where would you place your security researchers/hunt team?I replied:For me, "hunt" is just a form of detection. I dont see the need to build a "hunt" team. IR teams detect intruders using two...
Cybersecurity And Class M Planets
2nd Nov 2018 [3 months ago] from TaoSecurity
I was considering another debate about appropriate cybersecurity measures and I had the following thought: not all networks are the same. Profound, right? This is so obvious, yet so obviously forgotten.Too often when confronting a proposed...
Have Network, Need Network Security Monitoring
25th Oct 2018 [3 months ago] from TaoSecurity
I have been associated with network security monitoring my entire cybersecurity career, so I am obviously biased towards network-centric security strategies and technologies. I also work for a network security monitoring company (Corelight),...
Network Security Monitoring Vs Supply Chain Backdoors
5th Oct 2018 [4 months ago] from TaoSecurity
On October 4, 2018, Bloomberg published a story titled “The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies,” with a subtitle “The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple,...
Firewalls And The Need For Speed
18th Sep 2018 [4 months ago] from TaoSecurity
I was looking for resources on campus network design and found these slides(pdf) from a 2011 Network Startup Resource Center presentation. These two caught my attention:This bothered me, so I Tweeted about it.This started some discussion,...
1 2 3 Older »