Skip to content
SENKI
Surfing Internet Security & Resiliency as we thrive, heal, and grow in this life ….
  • Practical Security Guides, References, & Workbooks
    • DDoS Resiliency & Attack Preparation Workbook
      • DDoS Resiliency Workshop – 2022
      • DDoS Extortionist’s Behaviors
      • Operator’s Security & Resiliency Toolkit
      • Expected DoS Attacks – 10 Steps to Prepare for the Pain
      • 7 Habits of Highly Effective Cyber-Criminals
      • BGP Route Hijack – What can be done Today?
      • Preparing for DOS Attacks – the Essentials
        • Remote Triggered Black Hole (RTBH) Filtering
        • Monitoring Your Network for Malware, SPAM, BOTNET, and other Infections
        • Study Materials for Operational Security and DOS Defense
          • US’s National Strategy to Secure Cyberspace (2003)
        • SLA as a Security Tool
        • Remediating Violated Customers
        • Open Source Threat Intelligence Feeds
      • The History of DDoS and DoS
    • Network Operations & Scaling
      • Operator’s Security Toolkit – Main Page
        • The Service Provider Security “Bootcamp”
          • June 2014 Workshop Slides
          • Indonesia SP Workshops
          • CommunicAsia 2015
          • APRICOT 2012 Network Security Workshop
          • June 2014 Workshop Slides
          • Telecoms Security Workshop 2012
          • MAAWG 2012 Security Workshop
      • ISP Workshop Program
        • ITU Africa Telecom 98 IXP Demonstration
        • Singapore Internet Backbone (SIB)
      • Public Cloud DNS Resolvers (which offer services)
      • DNS Latency and Performance Test Tools
      • Network Operations Groups (NOGs)
    • Vendor Security
      • Meaningful Security Conversations with your Vendors
      • IoT Security Standards & Frameworks
    • Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers
  • Empowerment
    • Effective Linkedin Connections – Building Your Network
    • Building and Investing in a Community of “Contacts”
    • Principles to invest in Linkedin for an Effective Impact
    • Social Media PODs for Security
    • Programs that Empower Women Engineers
    • Leveraging Credit Cards – Principles that Maximize Gain while Preventing Pain
  • About Senki
    • Conference Talks, Workshops, and Webinars
    • Stay Connected with Senki’s Updates
    • Barry’s BIO
      • What Drives Barry?
      • Influential Reading List
    • I’ve got an exciting opportunity for you ….

Tag: Red Hat Threat Actors

Black Hats, White Hats, Grey Hats, and now Red Hats

Black Hats, White Hats, Grey Hats, and now Red Hats

Posted on April 13, 2008June 30, 2023

We all know about White Hats (Cyber Good Guys), Black Hats (Cyber Bad Guys), and Grey Hats (White Hats who skirt the edge of legality). We’re missing a group. The three defined groups are all easily described by their economic motivations for doing what they do. But we have another group who are not easily Read More

Categories

  • Conferences, Webinars, & Workshops
  • Cyberwar
  • DoD, DDoS, and Denial of Service
  • Empowering Humanity
  • ICS (Industrial Control Systems)
  • Internet
  • Operator's Security Toolkit
  • Product Security
  • Scaling
  • Security, Resiliency, and Scaling
  • Telecom
  • Threat Actors
  • Uncategorized
  • Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy