Should We Pay Attention To Cyber Security?
The Current Landscape Can you even begin to imagine life without your laptop, tablet or Smartphone? Life today, for most of us, is lived at a pace previous generations would not have believed possible....
View ArticleCovert Operations: Kill Chain Actions using Security Analytics
In Special Operations, there are multiple actors on either side of the battlefield, at any point in time, attempting to achieve tactical leverage over the enemy. This leverage comes in multiple forms,...
View ArticleThe Great Tragedy of Single-Vendor Solutions: Why Best of Breed is Best of Class
Enterprise organizations evaluate dozens of products from different vendors on a regular basis, and technology team members often face the difficult decision of whether to attempt a combination of...
View ArticleOpenSSL Heartbleed Bug
Heartbleed is a serious vulnerability affecting OpenSSL cryptographic libraries. The Heartbleed vulnerability allows an attacker to steal information protected under normal SSL TLS conditions. The...
View ArticleNSS Labs Breach Detection Systems (BDS) Comparative Analysis Report
NSS labs just released their Breach Detection Systems Report found HERE. The purpose for this report is based on the concept that there is a need for security solutions that extend beyond defense...
View ArticleWhen Cyber Hacks Teach – More Than They Take
I’m sure we can all agree that hackers have posed a considerable threat to our privacy in the past, and are generally understood to be a nuisance. They’re the reason we have numbers, capital letters,...
View ArticleFrom 0-Day to Exploit – Buffer Overflow in Belkin N750 (CVE-2014-1635)
Vulnerability Summary A vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.16m, allows an unauthenticated remote...
View ArticleCore 4 “Back to the Basics”
In light of all the cyberattacks that have been well publicized as of late, we see the increasing need for skilled IT security resources to both protect against and respond to rapidly evolving...
View ArticleWeb Scanner Pro – a new product from Joe McCray and Tim Pierson
Tim Pierson, president of DataSentry and Joe McCray, legendary security pro and hacker as well as the current Chief Security Officer for Secure Ninja have been working on a brand new, exciting project....
View ArticleVulnerability assessment versus penetration test: which is best for you?
Chris Konrad, the Cyber Security Practice Manager for World Wide Technology wrote an an excellent article around vulnerability scanning versus penetration testing. This is a concept I find many people...
View Article