pmelson.blogspot.com
Paul Melson's Blog: October 2012
http://pmelson.blogspot.com/2012_10_01_archive.html
Blog about information security and other random topics. Saturday, October 13, 2012. GrrCON 2012 Forensics Challenge Walkthrough. This is a walk-through of the GrrCON 2012 Forensics Challenge that was designed by Jack Crook ( @jackcr. Special thanks to Jack for making it so much fun and challenging! You can read about the challenge here. You can download the challenge files from the links here. You can watch Jack's MiSec presentation on the challenge here. 1 How was the attack delivered? In Wireshark, cl...
pmelson.blogspot.com
Paul Melson's Blog: Information Security for Business Majors
http://pmelson.blogspot.com/2010/10/information-security-for-business.html
Blog about information security and other random topics. Saturday, October 9, 2010. Information Security for Business Majors. Update: Sorry, this really sucks. Somebody started giving a near exact copy of this presentation in an educational setting without crediting my work. I have taken it down. It's old content, anyway, and probably shouldn't be taught in college. Nicely done. Some food for thought in there for those of us already drowning in the infosec koolaid too. November 13, 2010 at 2:56 PM.
iobses.blogspot.com
Seguridad + Investigación: octubre 2013
http://iobses.blogspot.com/2013_10_01_archive.html
Un radar sobre investigación en seguridad informática, aprendizaje de máquinas y redes de computadoras, con particular interés en la actividad de América Latina. Jueves, 31 de octubre de 2013. Mapa de la Actividad Global sobre Ataques DoS. Hace unos dias atras, Google anuncio la publicacion del Mapa de Ataque Digital. Este sistema recoge datos de más de 270 proveedores de servicio Internet (ISP), ubicados alrededor del mundo. Http:/ www.digitalattackmap.com. El mapa también muestra algunas preferencias d...
iobses.blogspot.com
Seguridad + Investigación: Educación en la Web: Como hacer un buscador como Google... sin saber de programación!
http://iobses.blogspot.com/2012/03/educacion-en-la-web-como-hacer-un.html
Un radar sobre investigación en seguridad informática, aprendizaje de máquinas y redes de computadoras, con particular interés en la actividad de América Latina. Sábado, 10 de marzo de 2012. Educación en la Web: Como hacer un buscador como Google. sin saber de programación! Recientemente comenzó un curso de programación, totalmente gratis y desarrollado por profesores de las Universidades de Virginia y Stanford. El nombre del curso? Construyendo un Buscador Web (Building a Search Engine). Para todos aque...
iobses.blogspot.com
Seguridad + Investigación: Java... o cuando la seguridad no determina lo que debemos proteger
http://iobses.blogspot.com/2013/10/java-o-cuando-la-seguridad-no-determina.html
Un radar sobre investigación en seguridad informática, aprendizaje de máquinas y redes de computadoras, con particular interés en la actividad de América Latina. Sábado, 19 de octubre de 2013. Java o cuando la seguridad no determina lo que debemos proteger. 2) es el incremento en vulnerabilidades el resultado del creciente interes de atacantes, debido a la popularidad de Java? Y empresas como Apple incluso decidieron deshabilitar Java de forma remota entre todos sus usuarios. Las respuestas a las dos pre...
pmelson.blogspot.com
Paul Melson's Blog: May 2010
http://pmelson.blogspot.com/2010_05_01_archive.html
Blog about information security and other random topics. Thursday, May 20, 2010. The SIEM Market Discussion Continues. Bill Roth of LogLogic commented. On my Twitter exchange. With Rocky DeStefano of Visible Risk where we talked about LogLogic's announcement that they were discounting their SIEM product. I then wrote a reply, and it got a little long. So I made it a blog post instead. The ClueTrain Manifesto calls markets "conversations", so here goes. Sure we are. Are we seeing a great response? That sa...
pmelson.blogspot.com
Paul Melson's Blog: November 2009
http://pmelson.blogspot.com/2009_11_01_archive.html
Blog about information security and other random topics. Wednesday, November 18, 2009. ArcSight Logger VS Splunk. You are here because you are searching for information on Splunk vs. ArcSight Logger. I actually wrote this post months before posting it, but sat on it for reasons that may become apparent as you read on. If you want to hear me talk about my experience with Logger 4.0 through the beta process and beyond, you can check out the video case study. For larger businesses, Logger scales up. For...
pmelson.blogspot.com
Paul Melson's Blog: October 2009
http://pmelson.blogspot.com/2009_10_01_archive.html
Blog about information security and other random topics. Sunday, October 18, 2009. Two-For-One Talk: Malware Analysis for Everyone. These two mini-talks were originally going to be blog posts, but I needed a speaker for this month's ISSA meeting. So I volunteered myself. Here are the slides. Two-For-One Talk: Malware Analysis for Everyone. Subscribe to: Posts (Atom). View my complete profile. Two-For-One Talk: Malware Analysis for Everyone. Microsoft Security Response Center.
pmelson.blogspot.com
Paul Melson's Blog: December 2014
http://pmelson.blogspot.com/2014_12_01_archive.html
Blog about information security and other random topics. Thursday, December 11, 2014. GrrCON 2014 Executive Summit Keynote. In October I gave the keynote entitled "Effects of Cyber Security Breaches" at a closed session of GrrCON. The presentation was about the new relationship between cybersecurity, the board of directors, and a realistic look at the impacts of data breaches. Cybersecurity and The Board. Subscribe to: Posts (Atom). View my complete profile. GrrCON 2014 Executive Summit Keynote.