top of page
Stratigos news
Search
Jun 2, 20153 min read
Top Technical Mitigation Strategies (from the Australian DSD)
There are few solid pieces of empirical evidence on what works in security. The Australian Defense Signals Directorate (DSD) Strategies...
Feb 16, 20153 min read
How to Write a Great Resume
Lately we’ve working with people to help them improve how to present themselves. Some of the people we know well as great security...
Dec 23, 20142 min read
Schadenfreude and Shame in Security
Hype, opportunists, and bad ideas are getting the spotlight after the massive breach of Sony Pictures. Most of us observers are sitting...
Jul 31, 20141 min read
Can you be too secure?
When I hear someone say “you can never be too secure,” I assume they don’t understand the implications of that statement. Perfect...
Jul 14, 20131 min read
OWASP Mobile Security Project: Top 10 Risks Presentation
Over the weekend, Beau Woods presented to OWASP Korea on the OWASP Mobile Security Project. The presentation focused on the OWASP Top 10...
Mar 28, 20131 min read
Enhance Innovation and Improve Security like Zappo’s
Zappo’s is known for having a culture that spawns innovation. They do this in unconventional ways for an online retailer, such as asking...
Mar 20, 20136 min read
South Korean Media and Banks under Cyberattack
Update March 22, 2013 18:00 (UTC+9): New information from the Korean Communications Commission (KCC) said that the earlier report...
Mar 19, 20132 min read
Incident Response to Data Breaches and Schrodinger’s Cat
Are sloppy security controls actually beneficial to a company during a breach? This is an elephant in the room for Incident Response...
Blog posts
Video
Talks
Media
bottom of page