Tips

Tackling APT (Advanced Persistent Threats)

Posted September 10, 2014
1. Recon. 2. Incursion 3. Discovery 4. Capture 5. Exfiltration …

Read more »

How does whole disk encryption work?

Posted March 25, 2010 by Editorial Staff
See Symantec white paper for full explanation and system requirements. http://www.symantec.com/whole-disk-encryption …

Read more »

Detection, Deterrence and Defensive Tips

Posted October 15, 2009 by Editorial Staff
Editors Note: After writing these tips and then proofreading, we were struck by how this reminded us of a cold war survival plan. The three keywords for our tips themes are detection, deterrence and defense. Yes, deeeeefense, with emphasis, just like Robert Duvall in the movie “Falling Down.” We are further struck by how simple and pure an ideal like the internet was that now has to be defended with such eternal vigilance. Our personal and professional stakes in this battle are high. Just like the Cold War, we want our side to prevail and win. Unlike the Cold War, let’s not allow it to take 45 years. For these …

Read more »