Information Security Analytics Blog

By applying science to security we help our partners build their security programs based on facts rather than feelings. Follow our blog for the latest case studies and projects.

post-thumb
February 27, 2013

The Inside Liar

This was originally posted on blogger here.  A significant topic for risk management these days is the insider threat.  While it is accepted that the insider is the most likely threat actor, we have very little ability to deal with the insider threat. ...

read more
post-thumb
February 25, 2013

Infosec Management Is The Problem

This was originally posted on blogger here. I regularly hear keynotes, presentations, and press releases from industry and, in particular, the government, about how there are simply not enough information security professionals to do the jobs available. ...

read more
post-thumb
February 10, 2013

Defensive Construct Exchange Standard

This was originally posted on blogger here. It has come time to provide a standard for the transmission of information between defensive tools.  I understand that this is not a unique endeavor, however all attempts to this point have been limited by a single approach, a set of attributes a construct must or should have. ...

read more
post-thumb
February 10, 2013

Antivirus is Dead. Long live Antivirus!

This was originally posted on blogger here. Anti-virus is an oft-maligned tool in infosec. It clearly mitigates some risks. It also clearly misses many risks. But the discussion often misses some important questions: What is AV? ...

read more

LET’S WORK TOGETHER