Archives for electricfork

The NERC Distortion Field

What I should have said

Future of Security Products

Identifying Scope for a Breach

Defensive Kill Chain

Creating a tabletop exercise scenario

Establishing Defensive C2

Dragon Bytes Followup

Sustained Operations

Beginning Somewhere: Incident Response/Leadership Cycle

Digital Pearl Harbor

Applying Liddell Hart to Infosec

Patterns for Successful Incident Response

Social Disclosure

shmoocon 2011

Compliance Programs and Friction

secops superiority

random tidbits

phases of incident response

CIA Triad

Cause and Effect

stuxnet 2

Clausewitz and Defense in Depth

Utilizing the casebook method

Bazaar vs Cathedral

Red Team Journal

Security Incident Tracking

shmoocon 2009 recap

Beyond operational security

Recognizing False Arguments

SIEMs versus Incident Response

talking points

Your orientation is showing.



2009 Books

infosec interview questions part III

Shmoocon 2009 hype

Code of Conduct

grassroots response to organized crime

Infosec Interview Questions (part II)

Client vs Server Models

Security Religion

My SIRT Taxonomy

Practicing Security in Hard Economic Times

Fun Reading for Friday

On Malware Investigations

On Cyberwar

Fun Reading for Tuesday

Clausewitz - “On War”

Name That Unmarked Vehicle.


Attacking the supply chain

Border Patrol vs Endpoint DLP Security

Why Voicemail should go extinct

Another spin on hyperconnectedness

Clay Shirky’s new book


Security Systems

marginalizing threats

L0pht panel

Email as a platform

Thought Experiment: Years 2013 - 2018

Interviewing infosec positions

RSA conference

Security Vs Productivity

Becoming a better incident handler

Decentralizing the world

Shmoocon 08 observations

What is after DLP?


Linkedin followup

Ediscovery pocket guide

Why Zero Inbox Is Stupid

Security Through Functionality

Charmsec #3

Trending Metrics for McAfee

vi + Outlook

Mobile Devices and Contexts

Brave New War

Defining incidents

Google notebook


I’m professional

shmoocon ‘08

Covert Crawling Web 2.0

e-discovery processes

Book: Inside the Security Mind

Data and Swarm Theory

Ohio Government Laptop Stolen

Threat advantage

buzzword alert: Evolving Threat Landscapes

Command-line logging


Never write down passwords”

Firefox plugins and RSS

Practicing NSM via DIY attitude

Security Metrics (part 1)

Back to the basics

A Pointless Rant