Articles on Incident Response
- Social Networking Retrospective: Why I Started This Security Blog
- Career Depth of Knowledge in IT Is Not Enough Knowing technical syntax isn't enough—the Internet knows more reference information than you. Depth of knowledge combined with good judgment or nuanced insight is truly valuable. Learn to make...
- Social Networking Negative Sentiment May Help Search Engine Optimization An online store owner deliberately provoked negative feedback to increase links and PageRank—search engines didn't differentiate negative discussions from positive ones. This highlights the need for...
- Malware Honeypots as Part of a Modern IT Infrastructure Honeypots are decoy systems designed to be attacked. They slow intruders, decrease false positives (any connection is suspicious), capture malware samples, and reveal attacker intentions. The main...
- Malware Key Challenges of Combating Malware in the Enterprise Enterprise malware defense is harder than single-host protection due to diverse business needs preventing consistent controls, geographic dispersement creating visibility gaps, political complexities...
- Assessments Dealing with Misinformation During Security Assessments and Forensic Investigations Interview subjects don't always provide accurate information—they may not know details, remember incorrectly, or have incentives to mislead. Look for discrepancies between sources, ask similar...