Information Security Analytics Blog

By applying science to security we help our partners build their security programs based on facts rather than feelings. Follow our blog for the latest case studies and projects.

post-thumb
October 27, 2011

How to Plan Security and Meet Your Compliance

This was originally posted on blogger here. Crayons and Firewalls - How to Plan Your Security and Meet Your ComplianceAs infosec security professionals, we tend to talk about a few things:Attacking StuffComplaints about complianceComplaints about how vulnerable stuff is and how no-one wants to fix itComplaints about complainingI’m going to go a different direction with this blog. ...

read more
post-thumb
October 12, 2011

Security Without Patches

This was originally posted on blogger here. Let’s discuss something a bit awkward:  Not Patching.As security professionals, the first assessment of a security problem is that it is either due to a mistake in the code, a mistake in the config, a mistake in the RFC, or a mistake in the user. ...

read more
post-thumb
October 6, 2011

Risk Management: Context is the Key

This was originally posted on blogger here. I feel it’s time for me to comment on risk management a bit.  I have a good amount of history with security risk management, most of it done poorly, (much of it done poorly by me). ...

read more