No, Executing Offensive Actions Against Our Adversaries Really Does Have High...
This is a response to a CSO Online blog post by Jeff Bardin ("Caution: Not Executing Offensive Actions Against Our Adversaries is High Risk," November 2012.), which is a rebuttal to a blog post by Jody...
View ArticleDebating the Active Response Continuum: Defining the Terms of the Debate
[This post expresses the personal opinion of the author and is not an official statement representing the Honeynet Project.]At the AusCERT 2013 conference, Dmitri Alperovich called for debate about,...
View ArticleHide and go seek, not hide and go tweak
On July 31, 2013, Jason Geffner of CrowdStrike discussed a new tool called "Tortilla" that allows incident responders and computer security researchers to hide behind the Tor network as they poke and...
View ArticleThoughts on the Active Cyber Defense Certainty Act 2.0
On May 25, 2017, Representative Tom Graves released the second draft of proposed amendments to 18 U.S.C. 1030 (known as the Computer Fraud and Abuse Act). Representative Graves’ bill is known as the...
View Article
More Pages to Explore .....