Skip to main content

March 05, 2015

Why do they call it DLP?

I always have to ask myself every time I hear the acronym “DLP.” Why do they call it that? There is no “prevention” in most DLP. It should be called D...

See Details

February 23, 2015

The Diminishing Efficacy of Network Security | Optiv

I am an old-school network security guy, and it pains me to see the rapid decline of network security solutions due to the advancement of detection ev...

See Details

February 05, 2015

Cloud Security - You Have What You Bring

It should be no surprise that moving to the cloud is all the rage these days. After all, why wouldn’t people want it? You can replace hundreds of thou...

See Details

February 03, 2015

Challenges of Computer Forensics in Cloud and Hosted Environments

It seems like just about every week, I get into a conversation with a customer or account executive asking what our abilities are when it comes to com...

See Details

January 29, 2015

Resolving Layer 8 & 9 Issues

Ah, Layers 8 and 9. Everyone has theories about what these are and how best to account for them in your security architecture. Layers 1-7 have it easy...

See Details

January 15, 2015

DDoS Attacks Are Seldom What They Seem

In performing incident response over the years, I have frequently been pulled into DDoS incidents. These calls don’t come in every day, but they are p...

See Details

January 06, 2015

The Future of Forensics

I have wanted to write this article for a couple years now. I have been talking about enterprise forensics problems and limitations for about 10 years...

See Details

January 02, 2015

Preparing for an Incident

Out of the hundreds of incident response investigations I have been involved with, I find that most are a result of not taking proper steps to prepare...

See Details

December 23, 2014

Total Cost of 0wn3r$h!p

It is becoming both difficult and boring to keep up with all of the breaches hitting the headlines these days. It is difficult because of the ever inc...

See Details