Info Loss

Friday, July 14, 2017

Searching for a needle in a pcap haystack with pyshark

›
Faced with a bit of a challenge recently: I had a large (multi-megabyte) packet capture file from Wireshark and needed to extract informatio...
Wednesday, May 15, 2013

Searching Logs: A Work In Progress

›
A while back, I read a blog post at the SANS Internet Storm Center (ISC) handler's diary, " There's Value In Them There Logs ...
Wednesday, April 24, 2013

Security by Labels vs. Content

›
Generally, authorization security (determining whether a subject has access to data) is based on labels. For example, file pathnames determ...
Wednesday, April 18, 2012

Perfect Security?

›
Many years ago, I was privileged to hear Marcus Ranum speak at a conference for our regional NSFNet member network. At the time, I was of th...
Friday, March 23, 2012

Verizon Data Breach Report 2012

›
The Verizon Data Breach Report 2012 (pdf) has been released. The information security industry owes Verizon gratitude for the amount of dat...
Wednesday, March 14, 2012

RSA Conference 2012 Post-mortem

›
This year, my schedule at the RSA Conference 2012 was much different than previous conferences. As a speaker, I spent quite a bit of time pr...
Thursday, February 2, 2012

RSA Conference 2012 - Data Breaches and Web Servers: The Giant Sucking Sound

›
I'm scheduled to present "Data Breaches and Web Servers: The Giant Sucking Sound" at RSA Conference 2012 - session DAS-204 on...
›
Home
View web version

Musings on Data Security

Guy Helmer
CTO of Palisade Systems, Inc. Lecturer in Information Systems at Iowa State University.
View my complete profile
Powered by Blogger.