Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

AgitProp de la Journée: PRC PLA Focuses on Cyberwar →

June 30, 2015 by Marc Handelman in All is Information, Propaganda, FUD

Apparently, The Hill's Cory Bennett possesses a strong belief the PRC PLA are putting a 'new' focus on their cyber-this-or-that.

June 30, 2015 /Marc Handelman
All is Information, Propaganda, FUD

Infographic, IoT →

June 29, 2015 by Marc Handelman in All is Information, IoT, ISACA
June 29, 2015 /Marc Handelman
All is Information, IoT, ISACA

Humble →

June 26, 2015 by Marc Handelman in All is Information, Work Ethic, Information Security

Exceedingly well-crafted thought piece focusing on the notion of being humble - whilst attending to the business of information security. Today's Must Read.

"Being involved in information security is intimidating. Not just because you are dealing with complex technology with serious implications if you fail, but everyone around you is going to be smarter than you. Even your adversaries. Especially your adversaries. Get used to it." - via Tripwire's Ken Westin

June 26, 2015 /Marc Handelman
All is Information, Work Ethic, Information Security

Kurzgesagt, What is Life? →

June 25, 2015 by Marc Handelman in All is Information, Information Sciences, Science, Natural Science, Natural Philosophy
June 25, 2015 /Marc Handelman
All is Information, Information Sciences, Science, Natural Science, Natural Philosophy

Twenty One Forty →

June 25, 2015 by Marc Handelman in All is Information, History of the Internet, Information Security

Yes, Bunky, hindsight truly is 20/140...

"The seven young men sitting before some of Capitol Hill’s most powerful lawmakers weren’t graduate students or junior analysts from some think tank. No, Space Rogue, Kingpin, Mudge and the others were hackers who had come from the mysterious environs of cyberspace to deliver a terrifying warning to the world." - via The Washington Post's Craig Timberg

June 25, 2015 /Marc Handelman
All is Information, History of the Internet, Information Security

Le Bots Émerger →

June 24, 2015 by Marc Handelman in All is Information, Automation, Common Sense, Communications, Social Engineering, Must Read

La Fin de Twitter est Proche, otherwise known as The End of Twitter, Inc. (NasdaqGS: TWTR) is Near... via The Harvard Business Review, and written by Alexandera Samuel, comes this tell-all on the rise of 'bots infecting Twitter, and not necessarily the 'bots you may think. Entitled "How Bots Took Over Twitter". Congratulations, you have discovered Today's Must Read.

June 24, 2015 /Marc Handelman
All is Information, Automation, Common Sense, Communications, Social Engineering, Must Read

USCG Cyber Strategy

United States Coast Guard Cyber Strategy Released →

June 23, 2015 by Marc Handelman in All is Information, US Coast Guard, US Armed Forces, United States of America
June 23, 2015 /Marc Handelman
All is Information, US Coast Guard, US Armed Forces, United States of America

Bletchley Park's EDSAC →

June 22, 2015 by Marc Handelman in All is Information, Computation, Computer Science, Education, History
June 22, 2015 /Marc Handelman
All is Information, Computation, Computer Science, Education, History

All Your Automatonic Security Are Not Belong To Us →

June 22, 2015 by Marc Handelman in All is Information, Complexity, Automation, DevSecOps, DevOps

Well crafted thought piece appearing over at Darkmatters, a Norse blog, written by the inimitable Pete Herzog, regaling us with the truth of robotic security. Today's MustRead.

"The problem is that automating security creates a paradox. You see, in security, automation works best as a tool and not a wielder of tools. You see, your security automation is in charge of making periodic and systematic changes to controls and then verifying those changes." via Darkmatters, a Norse Security blog, by Pete Herzog

June 22, 2015 /Marc Handelman
All is Information, Complexity, Automation, DevSecOps, DevOps

Cyberwarfare, Not Game of Thrones... →

June 19, 2015 by Marc Handelman in All is Information, Cybersecurity, Cyberwar, US Armed Forces

More along these lines here.

June 19, 2015 /Marc Handelman
All is Information, Cybersecurity, Cyberwar, US Armed Forces

The Badness Continues, Flaws in iOS and OS X →

June 18, 2015 by Marc Handelman in All is Information, Operating System Security, Information Security

Maybe it's the impending Summer Solstice; well, whatever it 'tis, it ain't good, to use the vernacular... via journalist Dan Goodin, Ars Technica's Security Editor comes a Tale of Woe in Cupertino. Evidently, the flaws are signifcant and OS X Keychain related. Read the full story here.

"The consequences of such attacks are devastating, leading to complete disclosure of the most sensitive user information (e.g., passwords) to a malicious app even when it is sandboxed," the researchers warned. "Such findings, which we believe are just a tip of the iceberg, will certainly inspire the follow-up research on other XARA hazards across platforms." - via Dan Goodin, writing at Ars Technica

June 18, 2015 /Marc Handelman
All is Information, Operating System Security, Information Security

Maturing Information Security When Compliance Can't Cut It

June 18, 2015 by Marc Handelman in All is Information, Information Security, Infosec Competence
June 18, 2015 /Marc Handelman /Source
All is Information, Information Security, Infosec Competence

Smells Like Incompetence

June 17, 2015 by Marc Handelman in All is Information, Governmental Corruption, Government, Blatant Stupidity

via journalist Malena Carollo reporting for the eponymous Christian Science Monitor, comes an astonishing news item of what is perhaps the single most egregious failure in federal information security this century (so far...).

"Moving forward, Archuleta assured the committee that OPM would continue to improve their cybersecurity efforts and work on the recommendations given by the Inspector General "to the best of our ability." "That’s what frightens me, Mrs. Archuleta," said Rep. Mick Mulvaney (R) of South Carolina, "that this is the best of your ability." - via Malena Carollo reporting at the Christian Science Monitor

June 17, 2015 /Marc Handelman /Source
All is Information, Governmental Corruption, Government, Blatant Stupidity

New Frontier in Information Security

June 17, 2015 by Marc Handelman in All is Information, Hardware Security, Information Security
June 17, 2015 /Marc Handelman /Source
All is Information, Hardware Security, Information Security

Fractals of Africa

June 16, 2015 by Marc Handelman in All is Information, Mathematics, TED
June 16, 2015 /Marc Handelman
All is Information, Mathematics, TED

...to the Battlements, Yonder!

June 16, 2015 by Marc Handelman in Alternate Attack Analysis, All is Information, Common Sense, Critical Thinking, Defending Networks, Electronic Warfare, Information Security, Offensive Infosec, Defensive Infosec

RAND Corporation, has published a not-entirely-surprising study targeting what appears to be the highly unsuccessful security postures of organizations under scrutiny. Entitled "The Defender's Dilemma: Charting a Course Toward Cybersecurity". Apparently, the notion of "Come And Take It" is not a particularly successful stratagem in modern electronic warfare...

Citation Libicki, Martin C., Lillian Ablon and Tim Webb. The Defender's Dilemma: Charting a Course Toward Cybersecurity. Santa Monica, CA: RAND Corporation, 2015. http://www.rand.org/pubs/research_reports/RR1024. Also available in print form.

June 16, 2015 /Marc Handelman
Alternate Attack Analysis, All is Information, Common Sense, Critical Thinking, Defending Networks, Electronic Warfare, Information Security, Offensive Infosec, Defensive Infosec

Origami of Lang

June 15, 2015 by Marc Handelman in All is Information, Mathematics, TED
June 15, 2015 /Marc Handelman
All is Information, Mathematics, TED

Spencer's Prime

June 11, 2015 by Marc Handelman in Mathematics, TED, All is Information
June 11, 2015 /Marc Handelman
Mathematics, TED, All is Information

Samy's Garage Door Hack n' Crack →

June 10, 2015 by Marc Handelman in All is Information, Physical Security
June 10, 2015 /Marc Handelman
All is Information, Physical Security

Steganography, In the Round →

June 10, 2015 by Marc Handelman in All is Information, Information Security, Steganography, Cryptography

A more complete explanation, via Sophos security blog Naked Security author Paul Ducklin, of steganography in-the-round, as it were...

June 10, 2015 /Marc Handelman
All is Information, Information Security, Steganography, Cryptography
  • Newer
  • Older