Archive for March, 2018

Metrics, Measurement, and Information Security

March 28, 2018

Metric is a great word. Depending how you use it, it changes its meaning. The metric of a network path is quite different from the metric system. When it comes to measuring something, the might be an agreement. Why bother? Because we have heard of the term security metrics being used for something which should […]

Posted in Discussion, High Entropy, Security Comments Off on Metrics, Measurement, and Information Security

Advanced and In-Depth Persistent Defence

March 26, 2018

The attribution problem in digital attacks is one of these problems that get solved over and over again. Of course, there are forensics methods, analysis of code samples, false flags, mistakes, and plenty of information to get things wrong. This is nothing new. Covering tracks is being done for thousands of years. Why should the […]

Tags: , , ,
Posted in Discussion, Security Intelligence Comments Off on Advanced and In-Depth Persistent Defence

Upgrade to HTTP2

March 23, 2018

We are busy with a little housekeeping. Among other things we have changed the way you can access our blog. It is now using HTTP2. We also added encryption and redirect all HTTP requests to HTTPS. Search engines should update their caches as soon as they refresh the pages. Hopefully this does not break anything. […]

Tags: ,
Posted in Administrivia Comments Off on Upgrade to HTTP2

The Grotesqueness of the “Federal Hack” of the German Government Network

March 19, 2018

[Editor’s note: This article was originally published on the web site of the FM4 radio channel of the Austrian Broadcasting Corporation. We have translated the text in order to make the content accessible for our English-speaking audience. We will follow-up on it with an article of our own about attribution, digital warfare, security intelligence, and […]

Tags: , , ,
Posted in High Entropy, Security Intelligence Comments Off on The Grotesqueness of the “Federal Hack” of the German Government Network