Quantcast
Channel: The Fabius Maximus website » tenable network security
Browsing all 3 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How do we identify our attackers in cyberspace?

Summary: The news overflows with confident identification of cyberattackers. Today we have an account of hacking from a defender’s perspective, explaining the difficulty of attribution, written by our...

View Article



Image may be NSFW.
Clik here to view.

The horror of cyberspace: we can’t easily identify our attackers.

Summary: In this last of Marcus Ranum’s 2 posts about identifying cyber-attackers, he explains why the usual methods we read in the news are quite fallible — no matter how confidently they’re stated....

View Article

Image may be NSFW.
Clik here to view.

“Countdown To Zero Day” describes the new era of war, preparing you for the...

Summary:  Five years after Stuxnet first appeared we have a detailed analysis of its origin (at least, what’s known to the public) in Kim Zetter’s Countdown To Zero Day.  Here C. Thomas reviews it,...

View Article
Browsing all 3 articles
Browse latest View live




Latest Images