Understanding attacker resources

When classifying and identifying an attacker, we need to consider their motivations, as well as what resources they need or have to make a successful attack.  Let me share an example: Several years ago Sony was hacked by a North Korean group, the Guardians of Peace, because Sony was going to release a movie (the…

Continue Reading

Going dark…

Well, the time has come. I need to live up to my internal obligation.  I’m going dark.  I’m leaving the ‘community’. Goodbye Facebook! I think I might miss you, but probably not. I decided this spring it was time to quit Facebook.  I’ve been thinking about it for many months on and off again, and…

Continue Reading