Advanced persistent threats have garnered a lot of attention of late, deservedly so. APTs are arguably the most dangerous security concern for business organizations today, given their targeted nature.
Stories by Roger A. Grimes
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
As long-time readers already know, I'm a big fan of Bruce Schneier, CTO and founder of <a href="http://www.counterpane.com/">BT Counterpane</a>. Besides being a cryptographic and computer security authority, cryptographic algorithm creator, and author of many best-selling books on security, Bruce produces some of the most relevant conversations on computer security. I consider his books, <a href="http://www.schneier.com/crypto-gram.html">Cryptogram newsletter</a>, and <a href="http://www.schneier.com/blog">blog</a> must-reads for anyone in computer security.
I've written many times over the years, including as recently as last week, that letting users execute and install their own software will always allow viruses, worms, and Trojans to be successfully installed. Traditionally, I've recommended that users not have admin or root access, that they let system administrators choose what software is allowed and what is blocked. But this recommendation breaks down for several reasons.
At the beginning of each year I like to talk about what did or didn't happen during the past year, and what to expect in the coming year. Unlike past years, I'll try not to get too emotionally ramped up on all the failures.
I recently listened to a wonderful science program on National Public Radio discussing a book called Better: A Surgeon's Notes on Performance along with its author, Dr. Atul Gawande. The book discusses the reasons why some practitioners excel while others just meet the standards or perform poorly.
Have you ever had one of those moments where something you knew to be certain was turned upside down and you learned you had been wrong ... for years? A lot of Bruce Schneier’s writing gives me moments like that.
I’ve always been a firm believer in the idea of hacking yourself. After all, if you don’t hack yourself, the hackers will. So, if you’re a good security administrator, you must learn about the various hacking tools that might be used against your environment, become familiar with them, and use them.
By Roger A. Grimes
- Technical Analyst, Cybercrime Operations VIC
- Technical Analyst, Cybercrime Operations ACT
- Voice Engineer ACT
- Project Manager - Office Expansion Project NSW
- Healthcare Application Support Analyst role in Melbourne VIC
- Senior Business Analyst - Business Case - Risk & Compliance - Contract NSW
- Training SME ACT
- SAP Finance Analyst NSW
- Automation Tester NSW
- Salesforce CloudSense Lead VIC
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.