Clicky

Altaware, Inc. Cyber Security Blog

Detection is not the best approach

Words don’t do justice to understanding concepts, especially in newer fields like cyber security. These days the mantra is:
- Prevention
- Detection
- Response

However, it's misguided. Read More...

Using Dogs for Malware & Ransomware

For the longest time, cyber security was based upon the barking dog approach. Sound off alerts, hope someone pays attention. Well, that didn’t work well, but there is a dog analogy that makes a lot of sense with malware. Read More...

Cyber Doomsday Clock

OK, I’m a baby boomer. I grew up during the cold war era and with movies like Dr. Strangelove. One of those artifacts still with us is the concept of a doomsday clock, which as of my last check was set for 3 minutes to midnight. We need the same for cyber security. Read More...

Malware, nope, it's a human

I don’t like the word malware. Sure, it’s a pretty good word, software that intends to do malicious stuff. However, it’s totally wrong for today in terms of identifying the risk source which in turn minimizes the threat level. Read More...

Big Data is Toxic Data

Cyber Security and big data aren’t going hand in hand and that concerns me immensely. Read More...

Four Steps for Protecting Against Cyber Ransomware

Yes, you can protect yourself against ransomware (e.g. CryptoLocker and others), but you have to prepare ahead of time. Read More...

Firewall Sandwich for Additional Security

Firewall sandwiches are worthy of consideration based upon recent revelations about firewall backdoors. Read More...

Juniper Networks ScreenOS Backdoor

Juniper announced that certain versions of ScreenOS (used on Juniper Networks SSG firewalls) have multiple security issues. Read More...

Signs of a Cyber Breach

When trying to look for signs of a breach, here is a short list of breach detection methods. Read More...