-
David Lanter commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
A related article that came out today: Prolexic warns of spike in DrDoS(Distributed Reflection and Amplification Denial of Service ) attacks
Common networked devices: routers, hubs, printers, cameras, and sensors […] -
David Lanter commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
How to Report a DDoS Attack on the ICANN Blog (Internet Corporation for Assigned Names and Numbers)
“While ICANN’s role in mitigating these threats is limited, the Security Team offers these insights to raise […] -
David Lanter commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
In the News: Letter from PayPal Information Risk Management to Chairman of the Board of Internet Corporation for Assigned Names and Numbers: There appears to be anticipation that the introduction of new Internet […]
-
David Lanter commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Vaca’ chapters 24-27, and the two SANS articles on Open/Closed Public Key and Cyrptographic Hash Functions: The readings left me pondering the complexity of “trust” in working with distributed certificate […]
-
David Lanter commented on the post, Malware Inforgraphic, on the site Protection of Information Assets 11 years, 6 months ago
Interesting information, wonderfully presented. Thank you!
-
David Lanter commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Vaca Readings: A SAN can be critical infrastructure for facilitating efficient business continuity through centralized data management and protection. Like any critical IT resource, it needs to be planned and […]
-
David Lanter commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 6 months ago
News of the Week: Why Watering Hole Attacks Work
I found this item as I drilled down into news about the IE patches Microsoft is providing this week in part to address “…the series of watering hole attacks […] -
David Lanter commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca: This week’s readings covered a number of topics pertaining to the nature, benefits, and tradeoffs offered by alternative architectures and approaches to establish, leverage, and consolidate digital […]
-
David Lanter commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
News of the Week: I found reference to this item on AusCERT Week in Review, discussing efforts of Sophos, a data security provider, to bring attention to a Javascript vulnerability recently highlighted by a web […]
-
David Lanter commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca: This week’s readings provided a wide range of vulnerabilities and controls affecting IT Networks, Unix and Linux operating systems, Internet, intranets, LANS, Wireless networks, Cellular networks, […]
-
David Lanter commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the News: After reading Vaca’s Chapter 12 on Cellular Network Security I reflected on the fragility of our phone system, and came across an article by author of KrebsOnSecurity describing how he became the […]
-
David Lanter commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
PS: There appears to be something wrong with the system clock as it actually is now 6:02pm
-
David Lanter commented on the post, Weekly Question #7: Complete by March 27, 2017, on the site Protection of Information Assets 11 years, 7 months ago
David Lanter = tue87168
-
David Lanter commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the News: “Use of Cloud for Disaster Recovery, Backup and Desktop Set to Rise”
Article reports on a tudy of ~1300 IT professionals, and indicates adoption of Cloud Computing for Disaster Recovery (DR) is […]
-
David Lanter commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca: Chapter 38 – Homeland Security. As I read our assignment I wondered what the US Federal Government’s Recovery Time Objective (RTO) was. On page 667-669 the chapter’s authors list a series of Homeland […]
-
David Lanter commented on the post, Week 7 Materials, on the site Protection of Information Assets 11 years, 8 months ago
In the News: “Yahoo’s CEO Checked VPN logs before work-from-home ban”
While the article did not mention IT Risk as a motivator to Marissa Mayer’s review of Yahoo’s VPN logs, it is clear that the CEO’s new policy […] -
David Lanter commented on the post, Week 7 Materials, on the site Protection of Information Assets 11 years, 8 months ago
Readings:
SANS Reading Room Article “Implementing Physical Security – A Lord of the Rings”: An increasing number of IT workers are accessing their organization’s network remotely and engaging in flex-time and […] -
David Lanter commented on the post, Week 6 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
In the article: “The Myth of Secure Computing” (Austin, R.D. and A.R. Arby, 2003), the authors recognize and explain why digital security is at the bottom of the priority list of most business executives, and […]
-
David Lanter commented on the post, Week 6 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
News of the Day: Kevin Liston, in his SANS Internet Storm Center (isc.sans.edu) article: discusses the guidance he provided last week in response to: “My computer is acting strangely, do you think I have a virus?” […]
-
David Lanter commented on the post, Week 5 Materials Posted , on the site Protection of Information Assets 11 years, 8 months ago
The two SANS institutute InfoSec Reading Room articles assigned this week provide practical recommendations for implementing security awareness training programs. John Vaca, on the other hand, indicates that the […]
- Load More