Publication: TaoSecurity

First reported Mar 20 2014 - Updated Mar 20 2014 - 1 reports

Are Nation States Responsible for Evil Traffic Leaving Their Networks?

During recent talks to various audiences, I've mentioned discussions within the United Nations. One point from these discussions involved certain nation states agreeing to modes of behavior in cyber space. I found the document containing these recent ... [Published TaoSecurity - Mar 20 2014]
First reported Mar 17 2014 - Updated Mar 17 2014 - 1 reports

Five Thoughts from VADM Rogers Testimony

I had a chance to read  Advance Questions for Vice Admiral Michael S. Rogers, USN (pdf) this weekend.I wanted to share five thoughts based on excerpts from the VADM Rogers' answers to written questions posed by the Senate Armed Services Committee.1. ... [Published TaoSecurity - Mar 17 2014]
First reported Mar 08 2014 - Updated Mar 08 2014 - 1 reports

Bejtlich Teaching at Black Hat USA 2014

I'm pleased to announce that I will be teaching at  Black Hat USA 2014  2-3 and 4-5 August 2014 in Las Vegas, Nevada. The class in Network Security Monitoring 101 . I've taught this class in Las Vegas in July 2013 and Seattle in December 2013. I posted  ... [Published TaoSecurity - Mar 08 2014]
First reported Feb 22 2014 - Updated Feb 22 2014 - 1 reports

The Limits of Tool- and Tactics-Centric Thinking

Earlier today I read a post by Dave Aitel to his mailing list title Drinking the Cool-aid . Because it includes a chart you should review, I included a screenshot of it in this blog, below. Basically Dave lists several gross categories of defensive digital ... [Published TaoSecurity - Feb 22 2014]
Entities: Limits, Encryption, Security
First reported Feb 07 2014 - Updated Feb 07 2014 - 1 reports

More Russian Information Warfare

In all the hype about "cyberspace" and "cyberwar," it's easy to forget about information warfare. This term was in vogue in the military when I was an Air Force intelligence officer in the 1990s. The Russians were considered to be experts at using information ... [Published TaoSecurity - Feb 07 2014]
First reported Jan 27 2014 - Updated Jan 27 2014 - 1 reports

Quick Thought on Internet Governance and Edward Snowden

I am neither an Internet governance expert nor am I personally consumed by the issue. However, I wanted to point out a possible rhetorical inconsistency involving the Internet governance debate and another hot topic, theft of secret documents by insiders, ... [Published TaoSecurity - Jan 27 2014]
First reported Jan 26 2014 - Updated Jan 26 2014 - 1 reports

Suricata 2.0beta2 as IPS on Ubuntu 12.04

Today I decided to install Suricata , the open source intrusion detection and prevention engine from the Open Information Security Foundation (OISF) , as an IPS. I've been running Suricata in IDS mode through Security Onion on and off for several ... [Published TaoSecurity - Jan 26 2014]

Quotes

...Within the section titled "Recommendations on norms, rules and principles of responsible behaviour by States" I found the following noteworthy: 19...
...I'm dismayed because it sounds like the most important reason to establish a unified cyber command is the perception that "cyber attacks...allow only minutes to seconds to mount a defensive action." This is just not true for any strategically significant attack...
...He ignores or is ignorant of technology to defeat obfuscation and encryption used by intruders.He says "archiving large amounts of traffic is insanely expensive and requires massive analytics to process" which is wrong on both counts...
...net/~oisf/+archive/suricata-betaPress [ENTER] to continue or ctrl-c to cancel adding itgpg: keyring ` "/tmp/tmpqk6Ubk/secring.gpg' createdgpg: keyring `/tmp/tmpqk6Ubk/pubring.gpg' createdgpg: requesting key 66EB736F from hkp server keyserver.ubuntu.comgpg: /tmp/tmpqk6Ubk/trustdb.gpg: trustdb createdgpg: key 66EB736F: public key "Launchpad PPA for Peter Manev" importedgpg: Total number processed: 1gpg:"

More Content

All (7) | News (0) | Reports (0) | Blogs (7) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Are Nation States Responsible for Evil Traffic ... [Published TaoSecurity - Mar 20 2014]
Five Thoughts from VADM Rogers Testimony [Published TaoSecurity - Mar 17 2014]
Bejtlich Teaching at Black Hat USA 2014 [Published TaoSecurity - Mar 08 2014]
The Limits of Tool- and Tactics-Centric Thinking [Published TaoSecurity - Feb 22 2014]
More Russian Information Warfare [Published TaoSecurity - Feb 07 2014]
Quick Thought on Internet Governance and Edward... [Published TaoSecurity - Jan 27 2014]
Suricata 2.0beta2 as IPS on Ubuntu 12.04 [Published TaoSecurity - Jan 26 2014]
1
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Are Nation States Responsible for Evil Traffic ... [Published TaoSecurity - Mar 20 2014]
During recent talks to various audiences, I've mentioned discussions within the United Nations. One point from these discussions involved certain nation states agreeing to modes of behavior in cyber space. I found the document containing these recent ...
Five Thoughts from VADM Rogers Testimony [Published TaoSecurity - Mar 17 2014]
I had a chance to read  Advance Questions for Vice Admiral Michael S. Rogers, USN (pdf) this weekend.I wanted to share five thoughts based on excerpts from the VADM Rogers' answers to written questions posed by the Senate Armed Services Committee.1. ...
Bejtlich Teaching at Black Hat USA 2014 [Published TaoSecurity - Mar 08 2014]
I'm pleased to announce that I will be teaching at  Black Hat USA 2014  2-3 and 4-5 August 2014 in Las Vegas, Nevada. The class in Network Security Monitoring 101 . I've taught this class in Las Vegas in July 2013 and Seattle in December 2013. I posted  ...
The Limits of Tool- and Tactics-Centric Thinking [Published TaoSecurity - Feb 22 2014]
Earlier today I read a post by Dave Aitel to his mailing list title Drinking the Cool-aid . Because it includes a chart you should review, I included a screenshot of it in this blog, below. Basically Dave lists several gross categories of defensive digital ...
More Russian Information Warfare [Published TaoSecurity - Feb 07 2014]
In all the hype about "cyberspace" and "cyberwar," it's easy to forget about information warfare. This term was in vogue in the military when I was an Air Force intelligence officer in the 1990s. The Russians were considered to be experts at using information ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.