Articles on Incident Response
- Malware 4 Steps To Combat Malware Enterprise-Wide Enterprise malware defense follows four phases: Plan by understanding infection vectors and prioritizing targets; Resist using enterprise management systems to deploy controls at scale; Detect...
- Risk Management Non-Financial "Currency" for Framing Security Discussions Frame security discussions using internal "currency" beyond dollars—reputation, service availability, trade secrets. Also consider individual concerns: looking bad in front of managers, being fired...
- Social Networking Retrospective: Why I Started This Security Blog
- Career Depth of Knowledge in IT Is Not Enough Knowing technical syntax isn't enough—the Internet knows more reference information than you. Depth of knowledge combined with good judgment or nuanced insight is truly valuable. Learn to make...
- Social Networking Negative Sentiment May Help Search Engine Optimization An online store owner deliberately provoked negative feedback to increase links and PageRank—search engines didn't differentiate negative discussions from positive ones. This highlights the need for...
- Malware Honeypots as Part of a Modern IT Infrastructure Honeypots are decoy systems designed to be attacked. They slow intruders, decrease false positives (any connection is suspicious), capture malware samples, and reveal attacker intentions. The main...