Marcus Ranum

Type: Person
Name: Marcus Ranum
First reported Sep 19 2014 - Updated Sep 19 2014 - 1 reports

True White-Knuckled Stories of Metrics in Action: The Faculty Systems

A friend of mine is a security manager at a university. He keeps metrics for fun, mostly, he says, to torture people with. His project, over the years I've known him, is to constantly improve the service quality, reliability and security of the IT systems ... [Published Security Week - Sep 19 2014]
Entities: Compromise, Firewall, Action
First reported Sep 06 2014 - Updated Sep 06 2014 - 1 reports

RVAsec - KeyNote: The Easy Stuff is Done (Marcus Ranum)

Computer security is in an interesting spot right now -- the easy stuff, like building firewalls and setting up logging, we know how to do. But, now what? New stuff like Cloud Computing and Big Data scare security practitioners with as-yet unnamed problems; ... [Published SecurityTube.Net - Sep 06 2014]
First reported Sep 05 2014 - Updated Sep 06 2014 - 1 reports

Feedback Friday: iCloud Accounts of Celebrities Hacked - Industry Reactions

Early this week, news broke that Hackers were able to gain unauthorized access to the iCloud accounts of several celebrities. After getting access to the accounts, the attacker(s) leaked numerous private photos, including several nude and intimate photos. ... [Published Security Week - Sep 05 2014]
First reported Aug 29 2014 - Updated Aug 29 2014 - 1 reports

IDC reports endpoint security market is booming, but isn't antivirus dead?

Endpoint security has long been a headache for IT security teams. The proliferation of employee-owned smartphones, tablets and laptops being used for business (as well as the increased number of platforms and services within each of those categories), ... [Published SearchSecurity.com - Aug 29 2014]
First reported Jun 02 2014 - Updated Jun 02 2014 - 1 reports

Cybersecurity Expert Richard A. Clarke and LA County District Attorney...

Business Executives and IT Professionals Attend Cybercrime Summit in Record Numbers Nearly 800 of the country’s leading cybercrime experts, information security professionals, company CEOs and other C-suite business executives recently attended the 6th ... [Published PRWeb - Jun 02 2014]
First reported May 16 2014 - Updated May 16 2014 - 2 reports

Friday Summary: May 16, 2014

It’s odd, given the large number of security conferences I attend, how few sessions I get to see. I am always meeting with clients around events, but I rarely get to see the sessions. Secure360 is an exception, and that’s one of the reasons I like to ... [Published Security Bloggers Network - May 16 2014]
First reported May 14 2014 - Updated May 14 2014 - 1 reports

Establishing Your Own Metrics: What Not to Do

Warning: This section is going to be a bit “meta-” and it can't be helped. You can't talk about abstract meta-analysis any other way! Don't just ask your boss, “what metrics should I collect?” Metrics are 'produced' not 'collected'; you collect underlying ... [Published SecurityWeek RSS Feed - May 14 2014]
First reported Apr 30 2014 - Updated Apr 30 2014 - 1 reports

The Evolution of an Important Metric: The Poverty Line

Keeping with the definition that a metric is used to tell a story, let's look at an influential metric and how it was established, as well as a few things about how it has been historically presented. I'm going to use the metric as a way of red-flagging ... [Published SecurityWeek RSS Feed - Apr 30 2014]
First reported Apr 16 2014 - Updated Apr 16 2014 - 1 reports

XP-diency: beyond the end of the line

It won’t have escaped your attention that Windows XP has reached its sell-by date as far as Microsoft is concerned. In fact, my colleague Aryeh Goretsky included links to a whole load of ESET’s XP-related resources in his blog article Goodbye Windows ... [Published We Live Security - Apr 16 2014]
First reported Apr 11 2014 - Updated Apr 11 2014 - 1 reports

Risky Business #317 -- Cryptocalypse news plus Dave DeWalt interview

...and XP is dead. Long live XP...April 11, 2014 --This week's feature guest is the man with the Midas touch -- former McAfee president and current FireEye CEO Dave DeWalt. This is the guy who sold McAfee to Intel for $7.8 billion dollars, so I chat to ... [Published Risky Business - Apr 11 2014]
First reported Apr 06 2014 - Updated Apr 06 2014 - 3 reports

Thoughts on the RSA Conference, Boycotts, and Babes

Not all of his answers went over with all of the crowd, but I think that showed he was giving some genuine answers of his own rather than trying to amuse.    Informal Connections Lots of the real business at the conference really isn’t at the conference, ... [Published CERIAS WeBlogs - Apr 06 2014]
First reported Apr 02 2014 - Updated Apr 02 2014 - 1 reports

True White-Knuckled Stories of Metrics in Action: Sylvan

When you start your metrics program, you will find that a great deal of information can be gleaned from existing data that gets stored in various places.... When I was a junior systems administrator just out of college, I worked at a major hospital ... [Published SecurityWeek RSS Feed - Apr 02 2014]
Entities: Unix, Database, Action

More Content

All (23) | News (7) | Reports (0) | Blogs (16) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
True White-Knuckled Stories of Metrics in Actio... [Published Security Week - Sep 19 2014]
RVAsec - KeyNote: The Easy Stuff is Done (Marcu... [Published SecurityTube.Net - Sep 06 2014]
Feedback Friday: iCloud Accounts of Celebrities... [Published Security Week - Sep 05 2014]
IDC reports endpoint security market is booming... [Published SearchSecurity.com - Aug 29 2014]
Cybersecurity Expert Richard A. Clarke and LA C... [Published PRWeb - Jun 02 2014]
Friday Summary: May 16, 2014 [Published Security Bloggers Network - May 16 2014]
Friday Summary: May 16, 2014 [Published Securosis Highlights - May 16 2014]
Establishing Your Own Metrics: What Not to Do [Published SecurityWeek RSS Feed - May 14 2014]
The Evolution of an Important Metric: The Pover... [Published SecurityWeek RSS Feed - Apr 30 2014]
XP-diency: beyond the end of the line [Published We Live Security - Apr 16 2014]
Raoul Chiesa – from cybercrime to state-sponsor... [Published Security Affairs - Apr 14 2014]
Risky Business #317 -- Cryptocalypse news plus ... [Published Risky Business - Apr 11 2014]
Thoughts on the RSA Conference, Boycotts, and B... [Published CERIAS WeBlogs - Apr 06 2014]
Thoughts on the RSA Conference, Boycotts, and B... [Published CERIAS WeBlogs - Apr 06 2014]
Thoughts on the RSA Conference, Boycotts, and B... [Published CERIAS WeBlogs - Apr 06 2014]
True White-Knuckled Stories of Metrics in Actio... [Published SecurityWeek RSS Feed - Apr 02 2014]
Cybersecurity Pioneer Marcus Ranum to Speak at ... [Published PRWeb - Mar 23 2014]
Why Russia Won't Launch a Full-Scale Cyberattac... [Published Motherboard Magazine - Mar 15 2014]
Security Metrics: What is a "Metric"? [Published SecurityWeek RSS Feed - Mar 12 2014]
Incite 3/12/2014: Digging Out [Published Securosis Highlights - Mar 12 2014]
Marcus Ranum on security innovation and Big Data [Published Help Net Security - News - Mar 11 2014]
Security Metrics - Why Should You Care? [Published SecurityWeek RSS Feed - Feb 26 2014]
Introduction and Welcome - Security Metrics [Published SecurityWeek RSS Feed - Feb 13 2014]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
IT
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
RVAsec - KeyNote: The Easy Stuff is Done (Marcu... [Published SecurityTube.Net - Sep 06 2014]
Computer security is in an interesting spot right now -- the easy stuff, like building firewalls and setting up logging, we know how to do. But, now what? New stuff like Cloud Computing and Big Data scare security practitioners with as-yet unnamed problems; ...
Friday Summary: May 16, 2014 [Published Security Bloggers Network - May 16 2014]
It’s odd, given the large number of security conferences I attend, how few sessions I get to see. I am always meeting with clients around events, but I rarely get to see the sessions. Secure360 is an exception, and that’s one of the reasons I like to ...
Friday Summary: May 16, 2014 [Published Securosis Highlights - May 16 2014]
It’s odd, given the large number of security conferences I attend, how few sessions I get to see. I am always meeting with clients around events, but I rarely get to see the sessions. Secure360 is an exception, and that’s one of the reasons I like to ...
Establishing Your Own Metrics: What Not to Do [Published SecurityWeek RSS Feed - May 14 2014]
Warning: This section is going to be a bit “meta-” and it can't be helped. You can't talk about abstract meta-analysis any other way! Don't just ask your boss, “what metrics should I collect?” Metrics are 'produced' not 'collected'; you collect underlying ...
The Evolution of an Important Metric: The Pover... [Published SecurityWeek RSS Feed - Apr 30 2014]
Keeping with the definition that a metric is used to tell a story, let's look at an influential metric and how it was established, as well as a few things about how it has been historically presented. I'm going to use the metric as a way of red-flagging ...
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.