My Writing
- Tools Common Failures of Information Security Tools (Part 2) HIPS can miss attacks or wrongly block legitimate actions. Log management may fail to capture necessary events or confuse analysts with poor reporting. Vulnerability management tools may miss patches...
- Tools Common Failures of Information Security Tools (Part 1) Security tools have side effects like medicine. Network firewalls cause connectivity issues; WAFs block legitimate traffic after site updates and are difficult to troubleshoot; antivirus tools may...
- Career New Job, New Challenges, New Opportunities
- Social Networking 11 Security Tips for Online Social Networking Practical social networking security tips: ignore email links claiming to be from social sites, use HTTPS, periodically deauthorize unused apps, be skeptical of job postings, verify requests for...
- Social Networking Which Apps Are Authorized to Access Your Social Networking Accounts? Attackers may target less secure third-party apps authorized to access social networking accounts rather than attacking the platforms directly. Periodically review and deauthorize unused apps on...
- Risk Management Why Computer Users Don't Install Security Patches Users focus on web and mobile applications, not OS internals—they won't remember to patch. Give up educating people to install patches manually; updates must be completely automated without user...