An Inconvenient Truth – Local Warming & the Dangers of Blogging

I came across this amusing video of a Ted presentation on “Help Fight Local Warming“.  For those of you who have your own Blogs you may want to view this.  Those of you who are thinking about Blogging, this I am sure, is something that you may not have considered in your decision making process.  […]

Web Application Security Guidance

Over the holiday period I spent some time catching up on news items and emails that filled up my inbox over the preceding few months.  One item I did not look at until recently was an announcement about the Web Application Security Consortium (WASC).  WASC is an open forum to stimulate and create discussions regarding […]

Safari Incident Response

A friend of mine sent me this cool video on an attack on a hear of water buffalo in Africa.  It is a fascinating piece of video footage and shows how unpredictable and savage Mother Nature can be at times. After watching the video for a few times I could not help but draw parallels […]

Welcome to the Internet Help Desk

I came across this video a while back and stumbled across it again recently.  It is an amusing look at the frustrations many of us have faced in our time in supporting the end user.  The video is entitled “Welcome to the Internet Help Desk“.  Enjoy. If you have any amusing support stories please feel […]

Brian Honan Speaks About MAC Attacks

Further to the recent discovery of a new trojan written by cyber criminals which targets Apple MAC users, BH Consulting’s senior consultant Brian Honan was interviewed for the Digial Ireland supplement in today’s Irish Independent.  The article also appears on SiliconRepublic.com’s website.

Latest SANS Top 20 Released

SANS today released their latest Top 20 Internet Security Risks.  The launch was held today in London and the report highlights the continuing trend of increasing criminal involvement in cyber attacks and the focus of attacks moving away from networks and operating systems.  Instead the main points of attack are application vulnerabilities, especially in custom […]

Many A True Word is Said in Jest

Scott Adams takes a funny swipe today at the way information security managers are often viewed within an organisation.  I know a number of information security managers who would not see anything wrong with Mordac’s approach.  These same people also wish there were no users to corrupt their “secure” systems. It goes without saying that […]

NIST Releases Three New Special Publications

The US National Institute of Standards & Technology (NIST) have just released three new special publications.  They are; SP 800-111 Guide to Storage Encryption Technologies for End User Devices. SP 800-114 User’s Guide to Securing External Devices for Telework and Remote Access. SP 800-115 Technical Guide to Security Testing. I have found the material NIST […]

Spammers use religion as a hook

Most Sunday evenings I check my email and prepare for the week ahead.  This evening I happened to look into my spam quarantine to check that there were no real emails there by mistake.  As usual there were the usual spam emails selling me pills to enlarge certain parts of my body, reduce my weight, […]

Mergers & Acquisitions and Security

The information security marketplace has been hotting up quite a lot over the past few months and looks like it will continue to do so into the near future.  As we suffer more and more attacks the battle cry from many of the major vendors seems to be “Thar be gold in them there ills”.  Mike Rothman, the […]