Nice blog on applying the cyber kill chain against attackers
http://www.alienvault.com/blogs/security-essentials/defend-like-an-attacker-applying-the-cyber-kill-...
View ArticleDesk monitoring while away
Just posting to see if anyone has any cool ideas for monitoring you desk while you are away. I have a cube in an office that is open for anyone to come in and take things like a power supply or...
View ArticlePreferred SmartCard Vendor?
One of our clients had chosen smartcards for 2FA needs (for their VPN). We've implemented everything, and tested it using a couple free demo cards given to us, now we're ready to start the first phase...
View ArticleSuspicious IP 218.77.x.x attempted to connect
Last days I have got a SW notification alerts: " Suspicious IP 218.77.x.x attempted to connect ........" Any idea what to do with this? How to block attempt to connect in the future?How to check...
View ArticleSecurity issues with Spiceworks
my IT chief is putting security issues on the table.He wants me to check if SW is transmitting any info byck to the spiceworks Servers and if so which.I am thinking about blocking SW completely outside...
View ArticleHidden Wireless Security Cameras
I would explain the situation in detail, but it's kind of a tender/developing situation. We have someone stealing things from a local county building, and we need to be able to catch the person. We...
View ArticleHow to control Kaspersky Secuirty Center 10 from Windows workstation
KSC10, Windows 7; I am not sure if it can be done, so before digging for nothing, thought I might ask. KSC10 is installed on one of my 2008 servers. Rather than RDP into the server, I would like to...
View ArticleKaspersky endpoint security 10 issues with VNC and file sharing/security
Hello spiceheads,I just installed Kaspersky endpoint security on one of the PC on a remote network, I'm using VNC to install remotely; but when the installation comes up to the activation step, i...
View ArticleGiven the paranoid stance to encryption on here without mentioning....
....that encryption is pointless unless other steps are in place such as background checks, physicalaccess controls, transportation plans and connectingdecryptedfiles onto a system connected to the...
View ArticleWanted to share
Hey everyone,Wow, it's been almost 2 months since I have spent more than 5 minutes on here.Just wanted to share my latest project with you...
View Article3D Printed Skeleton Keys Can Pick High-Security Locks in Seconds
With the advent of 3-D printing security gets even more challenging. Bump keys are not new but the new technology makes it possible to create those with just a picture of the keyhole say security...
View ArticleCount 'em up... Break-in Methods
We have ALL had to do it some time or other.. I'm curious as to how many different methods there are. So, how do you break into computers that you administer? (keep things legal and...
View ArticleWhat those Windows call center scammers will do if you let them
You've probably gotten a call from a stranger telling you that they've noticed that your Windows computer is infected, and promising to help you out. The folks at TechCentral, a South African IT site,...
View ArticleSmartphone Kill Switch
The California governor has signed the smartphone kill switch bill into law, following in the footsteps of Minnesota. California companies wanting to sell smartphones now have to include a remote...
View ArticleAlternative IDS to Ossec
Hey all, quick question.Does anyone know of an alternative IDS (preferably open source) that can be used in lieu of Ossec? I was on a teleconference call recently and one of our VP's asked this...
View ArticleAre you a happy camper with your current endpoint provider?
Hey Spicey friends,My company, Sophos, wants to find out more about what makes Spiceheads happy/unhappy campers with their current endpoint solutions.We created this 90-second survey (seriously, it's a...
View ArticleKasperskyAntivirusEndpoint Security 10 for windows 8.1 compatibility or solution
what our the solution for the this Problem?I cannot install KAV 10 in windows 8.1, it seems compatability issue as per Kaspersky support, any solution?Thanks in advance.
View ArticleSecuring your school's network: How much is enough?
How far do you all go to secure your school network. I work at a K-8 School. I'd like to hear everybody's suggestions.
View ArticleWhy PGP must die
Cryptographer Matthew Green says privacy and authentication framework PGP, first released more than 20 years ago, is unsuitable for use nowadays. He cites unwieldy key exchange and key management,...
View Article