Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: Security

The Difference between Quantitative and Qualitative Risk Analysis and Why It Matters (Part 1)

– Many discussions of security risk analysis methodologies mention a distinction between quantitative and qualitative risk analysis, but virtually none of those discussions clarify the distinction in a rigorous way. The purpose of this 3-part series is to clarify that distinction and then show why…

How-To Easily Deploy Honeypots for Production Networks

– When discussing honeypots, security folks typically think of the researchers out there who are doing their best to track the shadow networks that plague the Internet. Their deployments are to gain attention and keep the attackers interested based on the mentality of “the lower hanging fruit.”…

Lessons from “Don’t copy that floppy” ’90s Video Still Relevant

– How many people remember the name of a short movie that is supposed to fight software piracy back in 1992 called “Don’t copy that floppy”? For the ones that do, the bad music, rhymes and situations have probably scarred us for life. Interestingly, there is a new message that one can take…

Wireless “Doom” Box

– Please excuse me for a moment while I change into my “used cars salesmen” motif: “Welcome to the Wonderful World of Disposable Devices. You can reprogram these with relative ease and leave them behind to conduct the crime for you!” Hmm, I guess I’ll stick with the day job. Anyways, this…

Wi-Fu! Attacking the 802.11 Client

– Wi-Fu! More than just a statement, it reflects you wireless security skill set from knowledge and practical experience. This covers everything from using the tools out there to profile and attack your wireless network, to checking the security of your client devices yourself. If you feel your…