bobwalder.blogspot.com
View From The Edge: June 2012
http://bobwalder.blogspot.com/2012_06_01_archive.html
View From The Edge. Musings on security and other things. Thursday, June 21, 2012. Newer Is Not Always Better. One of the great insights we have at NSS Labs, given the work that we do, is into the trends demonstrated by vendors in terms of performance and security effectiveness across multiple versions of a product. Follow me on Twitter ( @bwalder. To keep informed as new research is released. Subscribe to: Posts (Atom). Austin, Texas, United States. View my complete profile. Newer Is Not Always Better.
bobwalder.blogspot.com
View From The Edge: The Emperor Would Like His Clothes Back Please!
http://bobwalder.blogspot.com/2013/04/the-emperor-would-like-his-clothes-back.html
View From The Edge. Musings on security and other things. Monday, April 15, 2013. The Emperor Would Like His Clothes Back Please! There has been some discussion over on LinkedIn about the difference between NGFW and UTM and whether or not those terms are interchangeable. It seems the opinions vary depending on whether you are a) a confused customer, b) a vendor, or c) an analyst firm with a vested interest in perpetuating a distinction that no longer exists – if indeed it ever did. There, I said it!
bobwalder.blogspot.com
View From The Edge: April 2013
http://bobwalder.blogspot.com/2013_04_01_archive.html
View From The Edge. Musings on security and other things. Monday, April 15, 2013. The Emperor Would Like His Clothes Back Please! There has been some discussion over on LinkedIn about the difference between NGFW and UTM and whether or not those terms are interchangeable. It seems the opinions vary depending on whether you are a) a confused customer, b) a vendor, or c) an analyst firm with a vested interest in perpetuating a distinction that no longer exists – if indeed it ever did. There, I said it!
bobwalder.blogspot.com
View From The Edge: Why iOS Data Protection is Adequate for Corporate Use (And Why The Siri “Vulnerability” is a Non-issue)
http://bobwalder.blogspot.com/2011/10/why-ios-data-protection-is-adequate-for.html
View From The Edge. Musings on security and other things. Friday, October 21, 2011. Why iOS Data Protection is Adequate for Corporate Use (And Why The Siri “Vulnerability” is a Non-issue). So far so good, but what about those “researchers” that have written about the fact that jailbreaking an iOS device or connecting one to Ubuntu will provide access to all data on that device? Yes, unfortunately it is possible to jailbreak an iOS device and completely bypass the passcode. There are other ways to byp...
bobwalder.blogspot.com
View From The Edge: Is the Skyfalling? James Bond, Miss Moneypenny and the Kill Chain
http://bobwalder.blogspot.com/2012/12/is-skyfalling-james-bond-miss.html
View From The Edge. Musings on security and other things. Thursday, December 06, 2012. James Bond, Miss Moneypenny and the Kill Chain. When NSS analysts Stefan Frei. Started talking to me about the. My mind immediately drifted into the world of sharp tuxedos, Aston Martin DB5’s and Walther PPK’s. Basically, the kill chain refers to the route from an external attacker to a target, which leads to the compromise of a victim’s server or desktop machine, and looks something like this:. PA x PB = PA. And apply...
bobwalder.blogspot.com
View From The Edge: Bending The Rules And The Truth
http://bobwalder.blogspot.com/2013/03/bending-rules-and-truth.html
View From The Edge. Musings on security and other things. Friday, March 01, 2013. Bending The Rules And The Truth. It is very important to us at NSS to ensure that we are scrupulously fair and impartial when it comes to running our public group tests and presenting the results. We take great pains to ensure that the test data is accurate and is reflected correctly in the finished reports on our Web site - reports that go through countless levels of peer review before they are published. 8221; or “. Look ...
bobwalder.blogspot.com
View From The Edge: December 2012
http://bobwalder.blogspot.com/2012_12_01_archive.html
View From The Edge. Musings on security and other things. Thursday, December 06, 2012. James Bond, Miss Moneypenny and the Kill Chain. When NSS analysts Stefan Frei. Started talking to me about the. My mind immediately drifted into the world of sharp tuxedos, Aston Martin DB5’s and Walther PPK’s. Basically, the kill chain refers to the route from an external attacker to a target, which leads to the compromise of a victim’s server or desktop machine, and looks something like this:. PA x PB = PA. And apply...
bobwalder.blogspot.com
View From The Edge: Artistic Interpretation Discouraged
http://bobwalder.blogspot.com/2013/03/artistic-interpretation-discouraged.html
View From The Edge. Musings on security and other things. Wednesday, March 13, 2013. It seems my recent blog post. Caused quite a stir. This came as something of a surprise to me, given that our Marketing Police spend a lot of time slapping vendors on the wrist over their various marketing exuberances, and our budget for cease and desist letters from our legal counsel is approaching the size of our testing budget! Anyhow, I digress. Back to the original subject of the blog which, as you undoubtedly a...
bobwalder.blogspot.com
View From The Edge: March 2011
http://bobwalder.blogspot.com/2011_03_01_archive.html
View From The Edge. Musings on security and other things. Thursday, March 17, 2011. Secure Low-Cost Data Sharing and Collaboration With iPad. Given the availability and low cost of these low-end solutions, users are taking advantage of them in their own homegrown solutions, often regardless of corporate policy. Thus, it is imperative that IT departments address these low-end solutions quickly to restrict their use, or transition users to a more appropriate environment to ensure that those solutions a...