Articles on Incident Response
- Risk Management Non-Financial "Currency" for Framing Security Discussions Frame security discussions using internal "currency" beyond dollars—reputation, service availability, trade secrets. Also consider individual concerns: looking bad in front of managers, being fired...
- Social Networking Retrospective: Why I Started This Security Blog
- Career Depth of Knowledge in IT Is Not Enough Knowing technical syntax isn't enough—the Internet knows more reference information than you. Depth of knowledge combined with good judgment or nuanced insight is truly valuable. Learn to make...
- Social Networking Negative Sentiment May Help Search Engine Optimization An online store owner deliberately provoked negative feedback to increase links and PageRank—search engines didn't differentiate negative discussions from positive ones. This highlights the need for...
- Malware Honeypots as Part of a Modern IT Infrastructure Honeypots are decoy systems designed to be attacked. They slow intruders, decrease false positives (any connection is suspicious), capture malware samples, and reveal attacker intentions. The main...
- Malware Key Challenges of Combating Malware in the Enterprise Enterprise malware defense is harder than single-host protection due to diverse business needs preventing consistent controls, geographic dispersement creating visibility gaps, political complexities...