If you attended a big ISC2 event or were at any number of information security conferences, you’d have met him. I remember many years ago he was at an ISC2 event at the RSA Conference and we chatted a bit because he gave me a hard time (in jest) because I came in late to […]

Read More →

Interesting and yet so obvious. Researchers at the Danish telecom operator TDC identified an interesting trend where certain types of Distributed Denial of Service (DDoS) attacks were much more successful than others. The key? Taking advantage of a misconfigured firewall which accepts a certain type of traffic and must interpret and process the data. Affecting […]

Read More →