A Better Mouse Trap?
So, I’ve been thinking quite a bit about PCI and what it means. Here are a few things I’m willing to put forth as statements. Of course, I have a few unanswered questions too and I’ll put them out as...
View ArticlePolitics will not Save Us
Politicians have a vested interest in the security of our personal information. With compromises and data leakage on the rise, there is surely plenty to be astir over. We have even seen states begin...
View ArticleFind, the Power
I was doing some work on a very large log correlation server recently. By large I mean copious amounts of log files, not necessarily large in size. Essentially, the chief task was that I needed to...
View ArticleThe Curious Case of 1392
There are occasions in technology where events or results inspire feelings of mystery. Those, “it must be magic” moments when our existing body of knowledge is incapable of processing the situation. I...
View ArticleLions, Tigers, and…IP Addresses
For anyone who remembers their zoology, or has watched enough Animal Channel or National Geographic, the concept of large animal herds escaping predators by concentrating in tight groups should not be...
View ArticlePrivacy as a concept – Controlling information
Privacy, my fellow digital citizens, is a hydra of a beast. Many heads and many faces for sure, all of which enjoy a bevy of threats. Digital Footprints The notion that we leave digital footprints all...
View ArticleResuscitating John the Ripper for SHA-512
John the Ripper (http://www.openwall.com/john) is a well-known and mature password auditing tool. However, if you are working from a recent OS (e.g., Ubuntu 9.04 or later) that uses SHA-512 hashing...
View ArticleLeveling Up as a Security Professional
I read a great blog post by Jason Rudolph the other day. The post made me think about all of the people I have encountered over the years that were interested in the information security profession but...
View ArticlePrivacy as a concept- Confidentiality threats
As we discussed previously, privacy is a relative affair. However, despite the possible differences between what you and I consider private, we can logically group privacy threats into a few...
View ArticlePrivacy as a concept- Integrity threats
In the last part of our privacy series, we discussed threats to privacy from a confidentiality perspective. For this part of the series, let’s look at the oft-overlooked privacy threats related to...
View Article
More Pages to Explore .....