My Writing
- Risk Management Shrinking vs. Slicing the Pie of Online and Computer Crime Most security defenses "slice the pie"—making your target less attractive shifts attackers elsewhere without reducing overall crime. "Shrinking the pie" requires disrupting the ecosystem: stronger...
- Web Security Tracking Known Malicious Websites by ETag Identifiers HTTP ETags can track malicious websites even when attackers rotate domain names for the same malicious server. CompuCom found a single ETag associated with malware that could filter 12 domains and...
- Risk Management The Role of Rituals in Information Security Security practices often function as rituals—painstaking steps we follow out of habit that provide a sense of control. Rituals reduce stress by overloading working memory, blocking intrusive...
- Incident Response Discover Whether a Company Was Hacked - New Service
- Tools Analyze Memory of an Infected System With Mandiant's Redline Mandiant's free Redline tool triages potentially compromised hosts through live memory analysis, replacing Audit Viewer. It uses Memoryze to capture memory, assigns Malware Risk Index scores using...
- Assessments Security Assessment Testing for Client-Side Vulnerabilities Client-side penetration testing mimics real attacks by targeting unpatched desktop software via malicious emails or websites. Three approaches offer increasing intrusiveness: tracking link clicks to...