Publication: TaoSecurity

First reported Sep 16 2014 - Updated Sep 16 2014 - 1 reports

We Need More Than Penetration Testing

Last week I read an article titled   People too trusting when it comes to their cybersecurity, experts say  by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post: [Connor] Brewer is a 19-year-old sophomore at Butler ... [Published TaoSecurity - Sep 16 2014]
First reported Sep 16 2014 - Updated Sep 16 2014 - 1 reports

A Brief History of Network Security Monitoring

Last week I was pleased to deliver the keynote at the first Security Onion Conference in Augusta, GA, organized and hosted by Doug Burks. This was probably my favorite security event of the year, attended by many fans of Security Onion and the ... [Published TaoSecurity - Sep 16 2014]
First reported Sep 04 2014 - Updated Sep 04 2014 - 1 reports

Bejtlich Teaching at Black Hat Trainings 8-9 Dec 2014

I'm pleased to announce that I will be teaching  one class  at Black Hat Trainings 2014 in Potomac, MD, near DC, on 8-9 December 2014. The class is  Network Security Monitoring 101 . I taught this class in Las Vegas in July 2013 and 2014, and Seattle ... [Published TaoSecurity - Sep 04 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

Air Force Leaders Should Read This Book

I just finished reading  The Icarus Syndrome: The Role of Air Power Theory in the Evolution and Fate of the U.S. Air Force by Carl Builder. He published this book in 1994 and I wish I had read it 20 years ago as a new Air Force second lieutenant. ... [Published TaoSecurity - Aug 22 2014]
First reported Jun 02 2014 - Updated Jun 02 2014 - 1 reports

On the Twenty Years Since My USAFA Graduation

Twenty years ago today, on 1 June 1994, 1024 of us graduated from the United States Air Force Academy , commissioned as brand new second lieutenants. As of September 2012, over 600 members of the class of 1994 were still in uniform. I expect that ... [Published TaoSecurity - Jun 02 2014]
First reported May 14 2014 - Updated May 14 2014 - 1 reports

Video of Bejtlich at Cyber Crime Conference 2014

On Tuesday the 29th of April I delivered a keynote at the US Cyber Crime Conference in Leesburg, VA.The video is online although getting to it is more complicated than clicking on a link to YouTube.Here's what I did to access the video.First, visit ... [Published TaoSecurity - May 14 2014]
First reported May 04 2014 - Updated May 04 2014 - 1 reports

Brainwashed by The Cult of the Quick

Faster is better! Those of us with military backgrounds learned that speed is a "weapon" unto itself, a factor which is "inherently decisive" in military conflict. The benefit of speed was so ingrained into my Air Force training that I didn't recognize ... [Published TaoSecurity - May 04 2014]
First reported Apr 24 2014 - Updated Apr 24 2014 - 1 reports

Five Thoughts on New China Article

I just read a thoughtful article by Michael O'Hanlon and James Steinberg, posted at Brookings and Foreign Policy titled Don't Be a Menace to South (China Sea) .It addresses thorny questions regarding China as President Obama visits South Korea, Japan, ... [Published TaoSecurity - Apr 24 2014]

More Content

All (8) | News (0) | Reports (0) | Blogs (8) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
We Need More Than Penetration Testing [Published TaoSecurity - Sep 16 2014]
A Brief History of Network Security Monitoring [Published TaoSecurity - Sep 16 2014]
Bejtlich Teaching at Black Hat Trainings 8-9 De... [Published TaoSecurity - Sep 04 2014]
Air Force Leaders Should Read This Book [Published TaoSecurity - Aug 22 2014]
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
Video of Bejtlich at Cyber Crime Conference 2014 [Published TaoSecurity - May 14 2014]
Brainwashed by The Cult of the Quick [Published TaoSecurity - May 04 2014]
Five Thoughts on New China Article [Published TaoSecurity - Apr 24 2014]
1
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
We Need More Than Penetration Testing [Published TaoSecurity - Sep 16 2014]
Last week I read an article titled   People too trusting when it comes to their cybersecurity, experts say  by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post: [Connor] Brewer is a 19-year-old sophomore at Butler ...
A Brief History of Network Security Monitoring [Published TaoSecurity - Sep 16 2014]
Last week I was pleased to deliver the keynote at the first Security Onion Conference in Augusta, GA, organized and hosted by Doug Burks. This was probably my favorite security event of the year, attended by many fans of Security Onion and the ...
Bejtlich Teaching at Black Hat Trainings 8-9 De... [Published TaoSecurity - Sep 04 2014]
I'm pleased to announce that I will be teaching  one class  at Black Hat Trainings 2014 in Potomac, MD, near DC, on 8-9 December 2014. The class is  Network Security Monitoring 101 . I taught this class in Las Vegas in July 2013 and 2014, and Seattle ...
Air Force Leaders Should Read This Book [Published TaoSecurity - Aug 22 2014]
I just finished reading  The Icarus Syndrome: The Role of Air Power Theory in the Evolution and Fate of the U.S. Air Force by Carl Builder. He published this book in 1994 and I wish I had read it 20 years ago as a new Air Force second lieutenant. ...
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
Twenty years ago today, on 1 June 1994, 1024 of us graduated from the United States Air Force Academy , commissioned as brand new second lieutenants. As of September 2012, over 600 members of the class of 1994 were still in uniform. I expect that ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.