Normally I like to open the Summary with a bit of something from my personal life. Some sort of anecdote with a message. In other words, I blatantly ripped off Mike’s format for the Security Incite… long before he took over half the company. (With Mike, even a partnership can probably be defined as a hostile takeover, based solely on his gruff voice and honesty of opinion).
Heck, I can’t even remember any good anecdotes from the CCSK cloud security class Adrian and I taught last week in San Jose. Even when we hooked up with Richard Baker and our own James Arlen for dinner, I think half the conversation was about my and Jamie’s recent family trips to dinner. And that stripmall Thai place is probably better than the fanciest one here in Phoenix.
I don’t even have any good workout anecdotes. I’m back on the triathlon wagon and chugging along. Although I did get a really cool new heart rate monitor/GPS that I’m totally in love with. (The Garmin 910XT, which is friggin’ amazing). I probably need to pick a race to prep for, but am otherwise enjoying being healthy and relatively uninjured, and not getting run over by cars on my bike rides.
The kids are still cute and the older one is finally getting addicted to the iPad (which I encourage, although it is making normal computers really frustrating for her to use). They talk a lot, are growing too fast, and are far more interesting than anything else in my life. By nope, no major life lessons in the past few weeks that I can remember. Although there are some clear analogies between having kids and advanced persistent threats. Especially if you have daughters.
And work? The only lesson there is to be careful what you wish for, as I fail, on a daily basis, to keep up with my inbox. Never mind my actual projects. But business is good, some very cool research is on the way, and it’s nice to have a paycheck. And I swear the Nexus isn’t vaporware. It’s actually all torn apart as we hammer in a ton of updates based on the initial beta feedback.
In other words… life doesn’t suck. I actually enjoy it, and am amazed I get to write this on my iPad while sitting outside in perfect weather at a local restaurant. Besides, this is a security blog – if you’re reading it for life messages you need to get out more.
On to the Summary:
Webcasts, Podcasts, Outside Writing, and Conferences
- Rich quoted by Ars Technica on iCloud privacy and security.
- Rich, again over at Ars, but this time on iPhone forensics.
Favorite Securosis Posts
- Adrian Lane: iOS Data Security: Managed Devices. Both the post and the banter are quality.
- Mike Rothman: Defining Your iOS Data Security Strategy. Really liked this series by Rich. Great work and very timely. BYOD and other mobile security issues are the #1 concern of the folks I’m talking to during my travels.
- Rich: Vulnerability Management Evolution: Scanning the Infrastructure. Yes, we still have to deal with this stuff in 2012.
Other Securosis Posts
- Incite 4/4/2012: Travel the Barbarian.
- Watching the Watchers: Protect Credentials.
- Vulnerability Management Evolution: Introduction.
- iOS Data Security: Securing Data on Partially-Managed Devices.
- Understanding and Selecting DSP: Core Features.
- Understanding and Selecting DSP: Extended Features.
Favorite Outside Posts
- Adrian Lane: Hash Length Extension Attacks. Injection attack on MAC check. Interesting.
- Mike Rothman: Choosing Between Making Money and Doing What You Love. The answer? Both. Even if you can’t make your passion a full time gig, working at it a little every day seems to make folks happy. Good to know.
- Dave Lewis: Too many passwords? Just one does the trick.
- Rich: DNS Changer. Possibly the most important thing you’ll read this year.
Research Reports and Presentations
- Network-Based Malware Detection: Filling the Gaps of AV.
- Tokenization Guidance Analysis: Jan 2012.
- Applied Network Security Analysis: Moving from Data to Information.
- Tokenization Guidance.
- Security Management 2.0: Time to Replace Your SIEM?
- Fact-Based Network Security: Metrics and the Pursuit of Prioritization.
- Tokenization vs. Encryption: Options for Compliance.
Top News and Posts
- VMware High-Bandwidth Backdoor ROM Overwrite Privilege Elevation.
- Wig Wam Bam. & Citrix and CloudStack Citrix intends to join and contribute to Apache Software Foundation. This isn’t security specific, but it is big.
- Global Payments: Rumor and Innuendo. GPN is saying there was no POS or merchant account hacking, so this was a breach of their systems.
- Flashback Trojan Compromises Macs.
- Dear FBI, Who Lost $1 Billion? Oh my goodness, does Adam nail it with this one.
- Major VMWare vulnerability. Incredible research here.
- An only semi-blatant advertisement for our friend Mr. Mortman at EnStratus.
- ZeuS botnet targets USAirways passengers. (No, not while they’re on the plane… yet).
Blog Comment of the Week
Is it nicer to say “captive network” or “traffic backhauling”? That said, nice post, and definitely part of a strategy I’ve seen work, although the example that leaps to mind is actually a security products company