So I’ve been winding down my project at DARPA and thought I’d put down some at least close-to-final thoughts on it. I’ve been asked a number of times about how much people should charge for their work. Three things on this: The government is doing you a favor if you get accepted – you get to do what you want, keep it, and that’s it? That’s gotta be worth […]
security
security strikeout
Everybody’s Talkin’… no one’s doing? Talking to a CSO of a fortune 500 company and a CSO of a bank… asked them if they ran scanners or vulnerability assessment tools on their home systems. No. Of course no. 0-3. And pretty much no one I know in the security profession does… it’s way too painful, way too hard, way too… much of a pain in the ass. We talk […]
A series of events happened lately that caused me to reflect on how simple it would be to kill someone by phone call… or instant message… or perhaps by simply watching a video on a computer or television, ala The Ring (or Ring/リング), where if you watch a videotape you’ll die a week after. Or maybe tuning into do KDIE, with all the death metal hits. Or perhaps less […]
Why don’t any of the host configuration checking tools work on the mac? CIS, Bastille, ossec (they don’t do conf checking on mac, plus they claim to check CIS compliance on other platforms and don’t), etc. Just want something simple to run that would check the basics, try to crack a password or two, show SUIDs, file permissions… don’t make me have to write it myself ;(
Your most important systems are your least secure
I’ve a larger writing project afoot… putting it down to see how it looked in a different format. zen@trouble.org/2012/Draft Your most important systems are your least secure Here’s an easy one. Do you think that your most critical computers – the ones that are most important to your company’s health, wealth, and well-being – are among your most secure? If you answered yes you’re not alone in thinking so, […]