Information Security Analytics Blog

By applying science to security we help our partners build their security programs based on facts rather than feelings. Follow our blog for the latest case studies and projects.

post-thumb
April 2, 2012

We Need Better Defensive Tools

This was originally posted on blogger here. We Need Better Defensive ToolsPeriod.  The tools we have right now are basic, non-interoperable, and non-granular.  There is no Metasploit framework for defense. ...

read more
post-thumb
January 13, 2012

On Defending Networks

This was originally posted on blogger here. I just read Military Networks ‘Not Defensible,’ Says General Who Defends Them at Wired. In the article, he repeats a subtle point that I've heard from him before, " ...

read more
post-thumb
November 15, 2011

The Three Flavors of Security

This was originally posted on blogger here. A boss once told me, “In a ham and egg breakfast, the chicken is involved, but the pig’s committed”. ...

read more
post-thumb
November 1, 2011

Balkanizing the Internet

This was originally posted on blogger here. In light of the UK cyber security summit, I thought it might be appropriate to discuss the balkanization of the internet. ...

read more