Hiya all. I know I have been less than vigilant in my posting here. I am not going to promise I will get better since that hasn’t worked so far, but things might get a little more regular around here in the near future. Anywho, on with the show.
From the Blogosphere
Nathan McFeters has penned a nice post about responding to the DNS vulnerability and attacks. He also points to a post on The Frequency X Blog which also talks about the same topic.
Tom points to 0x0e’s post that puts forward a list of skills that a good pentesting team should have. It is a good list and worth keeping in mind when both building a team and when contracting for a team to do work.
Rich has written an interesting post about spies and infosec and self-interest. He also asks, Security Operations: Do you CAER? (Collection, Analysis, Escalations and Resolution.) A very intersting read.
Dave Lewis points out that NIST has revised several security guidelines.
Billy explores what can happen when your browser is registered to handle several protocols.
I didn’t get a chance to look at the Newsosphere, so this is it for the 29th.
Have a great day.