Five Tips to Prepare for a Security Incident

What is the state of your IT security team?

David Biser

July 16, 2015 - Posted by David Biser to Security Insight

Time for Change

When it comes to incident response, “always be prepared” is a key phrase. I often give lectures to security professionals, and one of my favorite questions to ask is, “How many hours per day do you spend at work?”. The usual answer is eight, which is common in the corporate world. We go to work. We spend our allotted amount of time doing whatever it is we do during the morning. We go to lunch. We return and finally we go home at the end of our eight hours. Do you think this is what the hackers are doing? No, they spend 12, 16 and even 18 or more hours a day trying to breach your network. They live, breath, eat and sleep hacking. Can your security staff say the same? 

If we fail to prepare for an incident or deal with a threat, then it is little wonder that we are losing the cybersecurity battle. Our enemies dream in code and we worry about the inter-office bureaucratic things. Rather than being given the time, the support and the authority... read more >

Any Port in a Storm

A forgotten port is a way in - so close them.

David Biser

May 28, 2015 - Posted by David Biser to Security Insight

Any Port in a Storm

Ports are a frequently forgotten or overlooked aspect. Ports are entrances to your network and exits for your data. Sadly, many organizations fail to realize this fact or deal with it in an adequate manner. For this blog post, I hope to remind you about ports and their importance to network security.

What is a Port?

First let us define a port. A port is a logical attachment point for computer communications. When thinking about ports from a network point of view, they are only numbers not physical devices. In the computer world, ports are also used to refer to the physical connections, such as between a monitor and a computer (i.e. a VGA port). For the purpose of this blog, however, we are referring to the logically-assigned number used for communications between systems or applications.

When computers communicate they usually use numbers. The first of these numbers are the source Internet Protocol (IP) address and the destination IP address.... read more >

Chickens Need Security Too!

Applying Real-World Security to the Digital World

David Biser

May 14, 2015 - Posted by David Biser to Security Insight

Fox and the Henhouse

Chickens need security too.

Yes, you read this correctly and you do not need glasses, Chickens need security too!  As a country person, I have spent some time doing risk assessments, penetration testing and tabletop exercises - for a flock of chickens. Some of the lessons learned from protecting a flock of chickens, desperately need to be adopted by those working in network security today.

Think of the chicken for just a moment. A chicken is a defenseless bird, preyed on by many different types of predators. They need protection. When raising chickens, a person must take this into account or their flock of chickens isn’t going to last long. There are foxes on the prowl that would love to have a nice, fresh chicken dinner. These foxes are smart – they can find and exploit the smallest hole in the fence or wall (and then all you have left are some chicken feathers).... read more >

<< Newer Entries | 1 | 2 | 3 | 4

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS