My Writing
- Tools Analyze Memory of an Infected System With Mandiant's Redline Mandiant's free Redline tool triages potentially compromised hosts through live memory analysis, replacing Audit Viewer. It uses Memoryze to capture memory, assigns Malware Risk Index scores using...
- Assessments Security Assessment Testing for Client-Side Vulnerabilities Client-side penetration testing mimics real attacks by targeting unpatched desktop software via malicious emails or websites. Three approaches offer increasing intrusiveness: tracking link clicks to...
- Risk Management Herd Behavior in Cybersecurity: The Good and The Bad The security industry exhibits herd-like behavior with both benefits and drawbacks. Higher vigilance by some allows others to focus elsewhere—good for collective defense. But anxiety is contagious...
- Tools Remotely Find Outdated Adobe Reader With HBGary AcroScrub HBGary's free AcroScrub utility remotely scans Windows hosts via WMI to find outdated Adobe Reader installations. During malware outbreaks exploiting Reader vulnerabilities, such lightweight...
- Malware Fear vs. Anxiety in Cybersecurity: What We Can Do Fear involves specific threats that can be addressed through threat modeling, while anxiety is a diffuse reaction to abstract concerns that's harder to resolve. Much security FUD induces anxiety...
- Leadership 4 Reasons Why Computer Users Dread Installing Security Updates Users avoid updates because they require too many clicks, downloads are heavy, finalizing requires reboots, and mechanisms fail for non-privileged users. Google Chrome and Windows Update show better...