Cyber Defense

Automotive Infotainment Systems Collect Sensitive Data

Modern motor vehicles are becoming "smartphones on wheels." They collect and store a growing volume of information that could surprise the people who drive or occupy the vehicles. The collected information could embarrass individuals, or could leak secrets about the organizations for whom the individuals work. From a cyber defense perspective, one risk is that … Continue reading Automotive Infotainment Systems Collect Sensitive Data


Anticipatory Active Defenses by Bryce Galbraith

We IT pros often commiserate about our struggles to implement effective security within our organizations, butAPTs have no sympathy for our challenges and frustrations. They know we struggle; they're counting on it. They know application whitelisting in full lockdown is hard to implement. They know passwords are the bane of security. They know most organizations … Continue reading Anticipatory Active Defenses by Bryce Galbraith


Announcing the online winners of...

The Final Cyber Defense Challenge 2015 Leaderboard Continue reading Announcing the online winners of...


FAQ on Law of Active Defense by Attorney Benjamin Wright

Q: Is Active Defense a well-defined topic in law and professional ethics? A: No. A great deal of cyber law, including Active Defense, is not well-defined. In cyber law, there is never a 100% guarantee that legal authorities will reach any particular conclusion about any particular activity. Legal understanding of topics like infosec and cyber … Continue reading FAQ on Law of Active Defense by Attorney Benjamin Wright


PowerShell Protect-CmsMessage Example Code, Limitations and Errors

PowerShell Protect-CmsMessage and Unprotect-CmsMessage provide an easy way to use RFC 5652 public key encryption of your data. This article gives example PowerShell code, and talks about limitations, issues, problems, error messages, and how to get around some of them. Continue reading PowerShell Protect-CmsMessage Example Code, Limitations and Errors