My Writing
- Malware Enterprises Won't Adopt Adobe Reader X Any Time Soon Adobe Reader X's Protected Mode sandbox significantly improves security, yet 56% of enterprise installations ran vulnerable older versions. Organizations lack skills for large-scale non-Microsoft...
- Social Networking Similarities Between Riots and Modern Internet Hacktivism Riots and hacktivism share dynamics: de-individuation provides impunity, instigating events assemble crowds and signal intentions, and "entrepreneurs" take first risky actions expecting others to...
- Tools Common Failures of Information Security Tools (Part 2) HIPS can miss attacks or wrongly block legitimate actions. Log management may fail to capture necessary events or confuse analysts with poor reporting. Vulnerability management tools may miss patches...
- Tools Common Failures of Information Security Tools (Part 1) Security tools have side effects like medicine. Network firewalls cause connectivity issues; WAFs block legitimate traffic after site updates and are difficult to troubleshoot; antivirus tools may...
- Career New Job, New Challenges, New Opportunities
- Social Networking 11 Security Tips for Online Social Networking Practical social networking security tips: ignore email links claiming to be from social sites, use HTTPS, periodically deauthorize unused apps, be skeptical of job postings, verify requests for...