by Neil Macdonald | January 31, 2013
Seriously, is anyone surprised?
I’m sure you’ve seen the news about Chinese infiltration at the New York Times:
According to the article:
Over the course of three months,...
by Neil Macdonald | February 3, 2012
I’ve blogged before about advanced threats that easily bypass our traditional protection mechanisms and reside undetected for extended periods of time on our systems.
On one of the panels I...
by Neil Macdonald | January 9, 2012
I called this a “security no brainer” years ago and the advice is absolutely still relevant today.
In Gartner’s latest Magic Quadrant for Dynamic Application Security Testing (DAST) solutions for...
by Neil Macdonald | August 23, 2011
Run more of your Windows users without administrator rights.
I’ve talked about this several times before – including here, here and here.
While it may not be feasible to remove...
by Neil Macdonald | August 5, 2011
I had a discussion with a client today looking to protect sensitive intellectual property in their source code. I discussed two primary areas of risk: 1) that the developers (some...