Malware is Using TOR to Bypass Your Domain Blacklists
About a week ago I turned on a new rule on our IPS system that is designed to detect (and block) users who are using TOR to make their activities on our network anonymous. You can say that TOR is...
View ArticleCombining Tools for Ultimate Malware Threat Intelligence
Last year I gave a talk at a number of different conferences called "The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems" in which I spoke about how if we can break our security...
View ArticleAnalyzing NetFlow for Data Loss Detection
The 2014 Verizon Data Breach Investigation Report (DBIR) is out and it paints quite the gloomy picture of the world we live in today where cyber security is concerned. With over 63,000 security...
View ArticleWhy You Shouldn’t Phish Your Users
As an Information Security Program Owner, I get a barrage of e-mails and phone calls multiple times a day from vendors looking to sell us their latest hotness security product. Between the e-mails,...
View Article
More Pages to Explore .....