Spire Security Viewpoint

Spire Security Viewpoint

Risk and Cybersecurity Analysis

Main menu

  • Security Economics
  • Metrics
  • Four Disciplines
    • Identity Management
    • Vulnerability Management
    • Threat Management
    • Trust Management
  • AMP Firehose
  • Research
  • About

Sub menu

Categories

  • AMP Firehose (7)
  • Economics and Risk (38)
  • Highlights (373)
  • Identity Management (104)
  • Incidents (36)
  • Metrics (86)
  • Quotes (2)
  • Random (33)
  • Threat Management (128)
  • Trust Management (16)
  • Vulnerability Management (210)

Meta

  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org

Archives

AMP Firehose, Economics and Risk, Highlights

Do you need “Advanced Malware Protection” from 0days and the APT? Key Economic Considerations

by Pete Lindstrom • August 27, 2013

Events over the past few years have heightened attention on attackers with more serious intentions than script kiddies or casual hackers. The “advanced persistent threat” has been outed, first generally by Google and RSA, then much more explicitly by Mandiant.…

Read more →

AMP Firehose, Economics and Risk

New Workshop: Drinking from the Advanced Malware Protection Firehose

by Pete Lindstrom • August 27, 2013

“Drinking from the Advanced Malware Protection (AMP) Firehose” is a workshop for information security architects, managers and tech-savvy executives to evaluate the ability of newer and evolving AMP solutions (whitelists, sandboxes, active forensics) to address the challenges of zero-day and…

Read more →

Economics and Risk, Metrics

Does “Risk = T * V * I? Notes on Pr(t) * Pr(v) = Pr(event)

by Pete Lindstrom • August 12, 2013

On the SIRA mailing list, we are discussing the age-old risk equation “Risk = Threats x Vulns x Impact (or Consequences).” A number of folks think it is nonsense. Here’s why I don’t. (Email to SIRA mailing list). Before I…

Read more →

Economics and Risk, Metrics, Vulnerability Management

Which is More Secure – Android or iOS?: Tale of the Tape

by Pete Lindstrom • July 19, 2013

Tech risk professionals love to have debates about platform security, though it used to be Windows vs. Linux (really closed vs. open source) which morphed to Windows vs. Apple and is now Android vs. iOS. In any case, there are…

Read more →

Economics and Risk

On Information Value and Loss; The Simplicity of Breakeven Analysis

by Pete Lindstrom • July 9, 2013

On the SecurityMetrics mailing list, Dan Geer wrote: We have, of course, been around the mountain several times on how to value information. There are at least these: 1. acquisition cost (worth what you paid for it) 2. replacement cost…

Read more →

Highlights

Who Do You Trust? Is it Time for a CyberSwitzerland?

by Pete Lindstrom • June 12, 2013

A brief Twitter conversation with Phil Cox (@sec_prof) and Dave Piscitello (@securityskeptic) and the latest PRISM / NSA news got me thinking about trust. Phil suggested that the time is ripe for some sort of Internet “Switzerland” where a U.S.…

Read more →

Page 2 of 142
« 1 2 3 4 … 142 »

Search This Site

Copyright © 2025 Spire Security Viewpoint. All Rights Reserved. Magazine Basic created by c.bavota.