Featured Posts

Security Advocacy in the Cloud with Jacob Ansari from Schellman

Security Advocacy in the Cloud with Jacob Ansari from Schellman

In this episode, we talk with Jacob Ansari, a Security Advocate at Schellman, who leads the firm's security best practices advocacy. With experience as a CISO and assessor, Jacob develops and leads educational efforts on security practices, emerging threats, and...

All Posts

owasp2013

OWASP Top Ten 2013 Updates

When an industry leader updates their flagship product, the technology community pays attention.  Any time Apple updates the iPhone, the tech ...
Read More
All Your SCADA Are Belong to Us

All Your SCADA Are Belong to Us

SCADA systems control many industrial facilities we all depend upon. These systems are vulnerable to attack. Fortunately, there are some tried ...
Read More
Java & Adobe - A Hacker's Best Friends

Java & Adobe – A Hacker’s Best Friends

Everybody needs friends. People you can depend on when times are rough. A buddy who will always come through and be ...
Read More
Intrusion Prevention Endgame

Intrusion Prevention Endgame

All good things must come to an end.  In the late 90’s I was fortunate to be involved with the development ...
Read More
UTM v NGFW: A Single Shade of Gray

UTM v NGFW: A Single Shade of Gray

What is the difference between Unified Threat Management (UTM) and Next Generation Firewalls (NGFW)? Anitian explored these two technologies and finds ...
Read More

Repost: Black Hat Hype Hurts the Risk Management Process

While Black Hat has been notably quieter and less frothy this year, this article (published in 2010) still rings true.  Hype ...
Read More
Packet Goes Where? The Value of Firewall Naming Conventions

Packet Goes Where? The Value of Firewall Naming Conventions

A zillion or so years ago, humans developed writing. This was a big deal for civilization. People could document things like ...
Read More
Cultural Zero-Day: How Poor Leadership Begets Security Weakness

Cultural Zero-Day: How Poor Leadership Begets Security Weakness

In the ten years Anitian has been working incident response and digital forensic cases, our analysts have observed many ingenious ways ...
Read More
PCI: I Find Your Lack of Scope Disturbing - Anitian

PCI: I Find Your Lack of Scope Disturbing

I find your lack of a scope of compliance disturbing ...
Read More
All Security is Human

All Security is Human

All security is human. I forget where I heard that or read it, but it underlines a simple reality about security ...
Read More
Outside (Security) Advice is Sound Advice

Outside (Security) Advice is Sound Advice

Every year the executives of Anitian hunker down in some remote location and hash out our plans for world domination. Okay, ...
Read More
The Cult of Palo Alto Networks

The Cult of Palo Alto Networks

What is it about Palo Alto Networks? They seem more like a cult than a firewall manufacturer ...
Read More
Android Hacks - No Surprise

Android Hacks – No Surprise

I mean seriously people, why is this surprising? Everytime I mention that Android is the most hacked platform out there right ...
Read More
BYOD IT: Is it Possible?

BYOD IT: Is it Possible?

One of the big things I hear IT people, especially at larger organizations, discuss is the idea of BYOD or “Bring ...
Read More

Slash your costs with Anitian

Gartner Hype Cycle - Anitian

FedRAMP guide