Many thanks to the organizers of the Cloud Developers Summit and Expo 2014 last month in Austin. The conference was enjoyable and educational. And it’s always a huge bonus when conference content is made availability electronically for posterity. To that end, the full archive is here. I’m looking forward to the next CDSE!
There are three principles to securing online payment transactions: Protect user payment account identity Securely express user intent Detect fraud The next sections summarize considerations for addressing each principle. Protect User Payment Account Identity Magnetic stripe cards aren’t cutting it from a security perspective: see the recent incidents involving Target, Home Depot, and PF Chang’s. […]
One of the bigger network security defense methodology trends over the past couple of years, Lockheed Martin’s Cyber Kill Chain model is useful for analyzing and mitigating Advanced Persistent Threat (APT) attacks in the enterprise. The sequential nature of the chain model expresses how the attack itself is vulnerable to disruption, and hence provides avenues […]
Pass the Hash (PTH) is one of the most potent exploits in the hacker arsenal for gaining system administrator privilege and compromising an entire enterprise network. Why? Because PTH can be successful simply by compromising a single machine. PTH works by extracting credential information from the computer’s memory. Any credential present on the computer is […]
Due to the BYOD and cloud computing trends, as well as to the presence of insider threats and sophisticated overseas adversaries, the enterprise network perimeter is a myth. That is, you can’t depend on an internet firewall to protect the critical data that defines a business. What can you do? Effective data protection requires layers […]
Big thank you to CARTES America 2014 for hosting my presentation, Using NSA Tradecraft to Protect Data on Mobile Devices. And who doesn’t love visiting Las Vegas before it gets really hot? All of the slide decks from CARTES America 2014 are available here.
Network security requires both top-down and bottom-up thinking. Read more about securing network endpoints in the 25th edition of the JW Secure Informer.
Reminder to those attending RSA in San Francisco this week: the below session is this morning and is free to Expo pass holders. In addition to the 10am panel, we’ll also be demonstrating the JW Secure StrongNet solution interoperating with a Continuous Monitoring agent from Microsoft Trustworthy Computing. Consistent with the theme of the TCG […]
Get Proactive with Security: Using Trusted Computing to Free Security Resources for the Day-to-Day Fires
Coming to RSA in San Francisco this year? The conference organizers would like to remind you that there is compelling content on the first day of conference, Monday, February 24, 2014. And an expo pass is enough to get you into these… any you get a free lunch! I’ll be participating in the following moderated […]
The secret to protecting big data isn’t to put it under a big tarp. Or to guard it with a big dog. No! The secret to protecting big data is encryption. And you don’t even need big encryption. Just regular encryption will do it. Information security is all about the basics: access control, authorization, confidentiality. […]