Is “Transparent” Web Caching Dead?

Over the last few months, I’ve been re-exam the value of web caches in a network architecture. Peers have asked me to write up the results. What follows are the results. The are provided to help operators not get pushed by vendors to make costly mistakes. “Web Caching” has been an effective and productive tool Read More

Weekend Read – Lessons from Heartbleed

Every vulnerability is a security lesson that will either be repeated or used to improve the organization. Lessons from Heartbleed is no different.  IMHO “The Matter of Heartbleed” is a mandatory paper for all security professionals! It points out the dynamics of a critical Internet vulnerability and how organizations respond. As a minimum, read the Read More

Don’t wait, prepare for the Internet Skills Gap

I’m grateful to my peers who spent the time to have coffee over this past week. We all see big changes in the industry and are really worried about the skills needed to capitalize on these changes. What follows are some thoughts that might be useful as we all explore how we can bridge the Read More

Get the Right People on the Bus and Finding Staff with that Internet Spirit

How do you find the people with the Internet Spirit? How do you ‘get the right people on the bus?’ Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a Read More

Pulling Practices and Techniques from Experience – “Pathetic DDoS vs Security Sites”

Read through Metasploit’s blog titled Pathetic DDoS vs Security Sites. It documents several key steps that many companies do not know with how to mitigate some of the impacts of a DDOS attack. In this case, we have a DDOS targeting a specific domain – metasploit.com.  Step 1 is to classify the attack. Traffic analysis Read More

Black Hats, White Hats, Grey Hats, and now Red Hats

We all know about White Hats (Cyber Good Guys), Black Hats (Cyber Bad Guys), and Grey Hats (White Hats who skirt the edge of legality). We’re missing a group. The three defined groups are all easily described by their economic motivations for doing what they do. But we have another group who are not easily Read More