Events over the past few years have heightened attention on attackers with more serious intentions than script kiddies or casual hackers. The “advanced persistent threat” has been outed, first generally by Google and RSA, then much more explicitly by Mandiant.…
Monthly Archives: August 2013
New Workshop: Drinking from the Advanced Malware Protection Firehose
by Pete Lindstrom • • Comments Off
“Drinking from the Advanced Malware Protection (AMP) Firehose” is a workshop for information security architects, managers and tech-savvy executives to evaluate the ability of newer and evolving AMP solutions (whitelists, sandboxes, active forensics) to address the challenges of zero-day and…
Does “Risk = T * V * I? Notes on Pr(t) * Pr(v) = Pr(event)
by Pete Lindstrom • • 1 Comment
On the SIRA mailing list, we are discussing the age-old risk equation “Risk = Threats x Vulns x Impact (or Consequences).” A number of folks think it is nonsense. Here’s why I don’t. (Email to SIRA mailing list). Before I…
