Visit the front pageVisit your profilePublish a blog post

The State of Information Security

While information security is much better today than it has ever been before; it is far from being in a position to adequately deal with modern-day threats. In order to address the gap, we must dive deeper in to the problem and develop an embraceable strategy for success. It is only when we understand who our adversaries are and what their motivations and tactics are will we be in a position to address the problem.

Do you know your enemy?

The state of Information Security

Malware authors have figured out how to evade AV by continually tweaking their binaries. They can circumvent content filtering systems by hacking legitimate sites (banner ads, etc.) that users are allowed to access. They flow right by IDPS and Malware Detection Systems through the same type of techniques. Firewalls offer good protection for inbound connection attempts, though the threat vector now consists of an attacker riding back in on legitimate outbound connections.


Israel and Iran, expense, capabilities and cyber strategies

Non-Decryptable? Really?

Saw this website:

Interesting.  Read the articles. I think this guy is on to something.  He's a legitimate college professor / researcher, computer scientist.  Has a patent in data compression.  Clearly, he understands the theory of encryption.  A good chunk of his articles appear to me, to be what he says they are--non decryptable by method.  I could guess.  But, that could take forever.  The possibilities are endless.

How to blog on Cyberwarzone

Dear Cyberwarzone community. Cyberwarzone provides an ideal environment to publish your mind. The Cyberwarzone website allows the community to provide their blogs on Cyberwarzone.

These blogs are provided by cyberwarzone members and are published to the world wide web.