If you attended a big ISC2 event or were at any number of information security conferences, you’d have met him. I remember many years ago he was at an ISC2 event at the RSA Conference and we chatted a bit because he gave me a hard time (in jest) because I came in late to […]

Read More →

Interesting and yet so obvious. Researchers at the Danish telecom operator TDC identified an interesting trend where certain types of Distributed Denial of Service (DDoS) attacks were much more successful than others. The key? Taking advantage of a misconfigured firewall which accepts a certain type of traffic and must interpret and process the data. Affecting […]

Read More →

Looks like Google is offering a pretty awesome on-line (and FREE) course on power searches on Google that spans a couple of weeks, includes some activities and on-line coursework, and even a certificate at the end. I just signed up – more info available on Google at: http://googleblog.blogspot.ca/2012/06/become-google-power-searcher.html Not sure how long the sign-up will […]

Read More →