It's more of a strategy to centralize protection efforts versus using a
de-centralized approach. I want go into the scalability issues and also
scope creep aspects however, as Chris points out, it would be far better
to share indications warnings with organizations that can leverage their
own
On Mon, Jul 9, 2012 at 11:22 PM, Christopher Morrow
morrowc.li...@gmail.com wrote:
But to help protect the private sector, he said it was important that the
intelligence agency be able to inform them about the type of malicious
translated: Hey, what if we could tell our private sector
On Tue, Jul 10, 2012 at 3:32 AM, shawn wilson ag4ve...@gmail.com wrote:
On Mon, Jul 9, 2012 at 11:22 PM, Christopher Morrow
morrowc.li...@gmail.com wrote:
But to help protect the private sector, he said it was important that the
intelligence agency be able to inform them about the type of
On Mon, 09 Jul 2012 21:46:51 -0400, William Allen Simpson said:
But to help protect the private sector, he said it was important that the
intelligence agency be able to inform them about the type of malicious
software and other cyber intrusions it is seeing and hear from companies
about what
On Tue, Jul 10, 2012 at 8:33 PM, valdis.kletni...@vt.edu wrote:
Back in the dark ages at the beginning of this millennium (L1on worm,
anybody?), the guys at SANS created this thing called DShield.
https://isc.sans.edu/about.html#history
Sure. But if what Gen.Alexander says comes off - this
The government is already doing this via the ISACs.
http://www.ren-isac.net/docs/charter.html
Cheers,
Harry
On 07/10/2012 11:13 AM, Suresh Ramasubramanian wrote:
On Tue, Jul 10, 2012 at 8:33 PM, valdis.kletni...@vt.edu wrote:
Back in the dark ages at the beginning of this millennium (L1on
“Come on! It’s time to play with the Wii!” Kimber dragged Chris to the middle
balance board. “Let’s do snowboarding first. That’s fun.” She let everyone get
in position, and started the snowboarding game. At first, Chris felt a little
clumsy. His massive, stuffed balls weighed heavily on his
On Tue, Jul 10, 2012 at 8:55 PM, Harry Hoffman
hhoff...@ip-solutions.net wrote:
The government is already doing this via the ISACs.
http://www.ren-isac.net/docs/charter.html
I have a lot of respect for what REN-ISAC does but it doesn't nearly
have the sort of coverage this project appears to
On Tue, 10 Jul 2012 21:19:07 +0530, Suresh Ramasubramanian said:
On Tue, Jul 10, 2012 at 8:55 PM, Harry Hoffman
hhoff...@ip-solutions.net wrote:
The government is already doing this via the ISACs.
http://www.ren-isac.net/docs/charter.html
I have a lot of respect for what REN-ISAC does
On Tue, Jul 10, 2012 at 9:24 PM, valdis.kletni...@vt.edu wrote:
I have a lot of respect for what REN-ISAC does but it doesn't nearly
have the sort of coverage this project appears to be looking at.
The important point is that it's hardly a new and revolutionary idea...
Sure. Is there any
can some op filter this asshole?
-- Forwarded message --
From: NIG NOG nanog...@yahoo.com
Date: Tue, Jul 10, 2012 at 11:44 AM
Subject: Re: U.S. spy agencies ... email for cybersecurity
To: Suresh Ramasubramanian ops.li...@gmail.com,
valdis.kletni...@vt.edu valdis.kletni...@vt.edu
Seriously, on the subject of email for cybersecurity, can we please just
black list NIG NOG nanog...@yahoo.com?
Jason K Pope
On Tue, 10 Jul 2012 12:05:36 -0400
shawn wilson ag4ve...@gmail.com wrote:
can some op filter this asshole?
Please stop forwarding the whole message; I'd already dropped him in my
procmail rules.
--
john
On Tue, Jul 10, 2012 at 12:16 PM, John Peach john-na...@johnpeach.com wrote:
On Tue, 10 Jul 2012 12:05:36 -0400
shawn wilson ag4ve...@gmail.com wrote:
can some op filter this asshole?
Please stop forwarding the whole message; I'd already dropped him in my
procmail rules.
*shrug*, it
To be fair, we really should listen to what he had to say;
http://www.c-span.org/Events/Director-of-NSA-Outlines-New-Threats-to-Security-and-Economy/10737432170-1/
The introduction by Wolfowitz doesn't really help the credibility, but the
master of FUD knows you have to build a foundation of
Somebody needs to give them a clue-by-four. The private sector
already has the Internet address where an email ... originated;
it's already in the Received lines. We don't need to be informed
about it, we already inform each other about it.
And it's already delivered at network speed.
It is
I think what Gen.Alexander said and what the reporter missed out is
that they're interested in malware traffic flows, bot CCs etc, rather
than smtp received headers
He said the information the government was seeking was the Internet
address where an email containing malicious software
(note, people ought to: 1) think about this on their own making up
their own minds, 2) understand that the press has some very weird
ideas, 3) take some better protections on their own, for their own
security)
also, I'm not judging the OP nor the reporter nor the ideas espoused
in the
One thing that GEN Alexander has is a clue. He was my Battalion Commander in
Germany in the early 90s and he is one of those guys you don't give a second
thought to following. Very competent.
19 matches
Mail list logo