Browsing All Posts filed under »Commercial IT Security Tools«

A New Hope…

December 24, 2013 by

0

Dave Aitel has graciously allowed us to run his commentaries before – see Hackers May Help Choose The Next US President and Aitel On Cyberwar. Dave is the founder and Chief [Security|technology|executive][1] Officer of Immunity, Inc, and runs the Daily Dave mailing list, where this article was originally published. It is re-published here with his kind permission. So […]

Cyber-Criminal OPSEC – a Three-Part Series. Part III: TTTP

June 15, 2012 by

6

In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talked about computer environmentals, and how it’s possible to build a device fingerprint based on what the user presents when they show up to a web server and ask for something and how […]

Aitel on Cyberwar and DHS on Anonymous

August 9, 2011 by

2

There are several things on my mind today and I don’t have a lot of time, so I want to throw out the two most important ones. First, Dave Aitel’s presentation on Three Cyber War Fallacies explores some of the more common misconceptions about cyber attacks. If you have anything do do with cyber – […]

OSINT, Search Tools & Search Tip Roundup

July 19, 2011 by

4

Over the past two weeks – in fact since March – we’ve been talking a lot about search, specifically how law enforcement and analysts can use open sources to enhance their understanding of a given issue or target. This article is a roundup, and some new stuff to help cops and analysts search for things. […]

II – Cyber Doctrine: Competitiveness is the Key to Resilience

June 30, 2011 by

3

Legislated security always fails. Government cannot tell people what to care about; markets can. That’s why I’m so excited about reading Cyber Doctrine: towards a coherent evolutionary framework for learning resilience, which has finally been released by The Institute for Security & Resilience Studies at University College London. This report seems to take into account […]

Another AZDPS Breach; Defending Police Networks

June 29, 2011 by

2

Last week we talked about the need to secure police networks. This week the dicsusion will continue, but first we should note that it appears the Arizona Department of Public Safety has suffered another breach – or at the least, that a second tranche of stolen documents has been published. The second tranche, which we […]

Get Yer Buzzword On: Marketing Law Enforcement Technology

June 16, 2011 by

0

It started at LEIM when I was speaking with a Laserfiche; as I wrote yesterday, Laserfiche “…specialize in taking the printed output of all your disparate systems including CAD, RMS and GIS, placing them within a single digital bucket, and allowing you to classify, sort, search, store, print, and aggregate (if not correlate).” That’s not, […]