What Happens When “Shadow IT” Goes Missing?
Feb 17,
2014
Last week I told about how a vulnerable cloud server was deployed, ignored, and then owned by an attacker, with Amazon catching this and the entire cycle complete in just over two weeks. It had an obvious cause: skipping part of the process in which unneeded cloud resources are shut down. But I said that […]
New course on Protecting Your Perimeter
May 10,
2013
I spoke earlier this week to the author of Learning Tree’s new course (2010) Defending The Perimeter From Cyberattacks: Hands-On, Adrian Brian. Adrian and I have been friends for many years and when he told me he had just written this new course, I wanted to share it with you right away. This course addresses […]