Posted in Politics, Security, Technology, tagged Ariel Silverstone, Cyber Warfare, DDoS, Douche bag, hype, Idiot politicians, Marcus Ranum, Media, Michael Malone, North Korea, Peter Hoekstra, Stupidity, the day after on July 13, 2009 |
12 Comments »
Never before have so many misrepresented so much about so little…
In all my years in the security industry I do not believe I have read more misinformation than the nonsense surrounding the recent DDoS attacks. Apparently North Korea is waging Cyber Warfare, or if not an actual all out cyberwar they are behind a targeted “cyber attack”.
Let’s look at what we know…
- Multiple US and South Korean websites fell victim to sustained distributed denial of service attacks (happens all the time)
- The DDoS attack used tens of thousands of compromised hosts (I have seen bigger)
- The compromised hosts appear to have been infected using well known and easily shielded against malware (What else is new?)
- The organizations that were impacted and had taken proper measures to defend against a DDoS were not materially impacted (At least someone was thinking ahead)
This is just business as usual on the Internet – nothing to see here folks – these DDoS attacks could have been just as easily launched by an awkward prepubescent child with about 2 years of computer experience as they could have come from a coordinated, state-sponsored, North Korean attempt to test our defenses.
Just so we are clear this is no more Cyber Warfare than me running to the Mexican border and throwing 10,000 apple pies at the Mexican Federales is a coordinated US invasion of Mexico. (more…)
Read Full Post »
Posted in Security, tagged Amazon, cloud computing, endpoint security, evolution, Google, hype, information technology, Microsoft, mobile computing, smart phones, Trend Micro, VC, VDI, Virtual Center, Virtualization, VMWare on February 19, 2009 |
9 Comments »
I had an interesting conversation with a peer recently that started with a statement he made that “innovation was all but dead in security”. The implication was that we had done all we could do and that there was very little more that would be accomplished. Of course I felt this was an overly simplistic and narrow view, not to mention that it completely ignores the rather dramatic impact changes in computing infrastructures will have over the next 5-10 years and beyond.
How have enterprise architectures evolved over the past 10 years and how will it continue to evolve? Simply put we are pushing more of our computing assets and the infrastructure that supports them out into the Internet / cloud. It began with mobile computing devices, remote offices, and telecommuters and is now moving into aspects of the traditional internal infrastructure, such as storage, application / service delivery, and data management. This has forced IT to, in some cases, radically redefine the technologies and processes they implement to even provide the basics of availability, maintenance and security. How does an IT organization maintain the health and availability of the evolving enterprise while securing the environment? How do they ensure visibility into and control over an increasingly complex and opaque infrastructure? (more…)
Read Full Post »