Re: [Dailydave] Drinking the Cool-aid

2014-03-21 Thread dan
| Networks are often the result of successive technological layers. As | organizations take on new business, face new threats, reconsider | security notions (e.g., insider/outsider), or embrace new security | paradigms, more security products get deployed, adding complexity and | increasing

[Dailydave] Late Friday thoughts on the Kevin Mandia RSAC keynote.

2014-03-21 Thread Dave Aitel
http://www.rsaconference.com/videos/128/state-of-the-hack-one-year-after-the-apt1-report If 97% of the breaches you find are directly attributable to Chinese hackers (aka, due to keyboard language settings, C2 IP, etc.) then how much are you missing?! Boggles the mind. You're telling me you don't