As Cybersecurity/Infosec Professionals we know that all you have to do is wait 30 seconds and someone else has been breached and two new vulnerabilities have been discovered (hypothetically of course). There are few jobs on Earth that see the constantly evolving challenges that we get the privilege to deal with. This constant state of … Continue reading Opening a Can of Active Defense and Cyber Deception to Confuse and Frustrate Attackers
By Chris Crowley "What is a DDD report?" you're wondering. That's my pet name for a Daily DNS Delta. You see, human beings are creatures of habit. Some have excellent habits, some have gross habits, some actually wear habits, but whatever works for you, we all are creatures of habit. We can use this feature … Continue reading DNS Anomaly Analysis Tips: Did you put a new cover sheet on that DDD report?
[Editor's Note: Lee Neely has developed a very useful spreadsheet checklist to help organizations better plan and mitigate security risks associated with mobile devices, including phones and tablets. It's really handy stuff, and I strongly recommend you check it out! -Ed.] By Lee Neely To help organizations better understand, manage, and mitigate risks associated with … Continue reading SANS Checklist for Securing Mobile Devices in the Enterprise
[Editor's Note: Jeff McJunkin shares some insight into building a good virtualization infrastructure for practicing your pen test skills, evaluating tools, and just plain becoming a better penetration tester, all without breaking the bank. Nice! -Ed.] By Jeff McJunkin Practical, hands-on experience is a good thing, right? As good as it is though, it doesn't … Continue reading Building a Pen Test Lab - Hardware for Hacking at Home on the Cheap