esphion.blogs.com
Esphion: What is Zero Day protection?
http://esphion.blogs.com/esphion/2005/10/what_is_zero_da.html
Laquo; Deep packet inspection - A security risk? Of butterflies and raindrops. ». October 21, 2005. What is Zero Day protection? Let me try to clear up some confusion about the meaning of. Unfortunately, many vendors of security solutions modify the definition of this term as needed, to make their products appear in the most positive light. After all, they all want to be able to say: We offer zero day protection! Well, not so quick, please. On one hand, and the. Was, in effect, exploiting a zero day vuln...
esphion.blogs.com
Esphion: Rescuing the IPS
http://esphion.blogs.com/esphion/2005/09/rescuing_the_ip.html
Laquo; What is 'proactive detection'? Anomaly Detection 101 ». September 26, 2005. Lately, as we are talking to customers and partners, we are increasingly hearing one particular message more and more often:. Disappointment in the performance of IPSs . budgets being reallocated from IPS deployment projects to NBAD projects. In this article, I would like to explore where the disappointment comes from, and how IPS deployments (and investments) can be rescued. The wonderful world of IPS marketing. The prime...
esphion.blogs.com
Esphion: New liabilities - Or: Why anomaly detection has to be part of best-practices security
http://esphion.blogs.com/esphion/2005/08/new_liabilities.html
Laquo; What Zotob is teaching us - Or: The shrinking patch-window. The business worm ». August 19, 2005. New liabilities - Or: Why anomaly detection has to be part of best-practices security. In an opinionated, but insightful article. Worm outbreaks as security events. This means then that organizations in certain industries, in which regulations apply such as the Sarbanes-Oxley act. May face severe penalties for any such security incident. At the same time, these organizations are burdened with an I...
esphion.blogs.com
Esphion: Your private threat-detector
http://esphion.blogs.com/esphion/2005/11/your_private_th.html
Laquo; Of butterflies and raindrops. Worms exploring new territories ». November 17, 2005. We all know that it is a good idea to place smoke detectors throughout our houses. In theory, though, we could also wait for the neighbors, or the community in general, to call the fire-department once they see flames coming out of our house. Or if there is a larger fire in our neighborhood, we could assume that the sound of the sirens will be enough to alert us. If your network is targeted by a specific DDoS attac...
esphion.blogs.com
Esphion: Selling vulnerabilities to the highest bidder
http://esphion.blogs.com/esphion/2005/09/selling_vulnera.html
Laquo; The business worm. Red Herring ». September 01, 2005. Selling vulnerabilities to the highest bidder. In my recent article about the. Yesterday then, the. However, the article points out that if the offered bounty is not satisfactory to the discoverer of the vulnerability, they may just find someone else who is willing to pay more. The implication is, of course, that we may witness the beginning of a large-scale black-market for newly discovered vulnerabilities. September 01, 2005. I mean thomas sa...
esphion.blogs.com
Esphion: Worm detection - You need to do it yourself
http://esphion.blogs.com/esphion/2005/08/worm_detection_.html
Laquo; Don't assume - Or: Why intelligent anomaly detection is needed. Distributed computing for anomaly detection ». August 06, 2005. Worm detection - You need to do it yourself. Recently, as outlined in this CNET article. The details are explained in that article. In essence, those networks use honeypots. And the monitoring of activity on unused IP addresses to detect worm activity or capture worm samples. Both approaches can be detected with different techniques. Worse yet: A fast spreading worm, such...
esphion.blogs.com
Esphion: Red Herring
http://esphion.blogs.com/esphion/2005/09/red_herring.html
Laquo; Selling vulnerabilities to the highest bidder. Anomaly Detection. ». September 07, 2005. We're thrilled to have been named one of Red Herring. S Top 100 Private Companies of Asia. The list is Red Herring’s 2005 selection of the 100 most promising private technology companies in Asia. Cool. Here is what Greg (our CEO) had to say in his press release:. September 07, 2005 in Esphion News. You changes sound great! Good luck to everyone in the election(s). Posted by: pandora online. The comments to thi...
adventureblog.nationalgeographic.com
Adventurers of the Year 2012: Kayakers Jon Turk and Erik Boomer – Beyond the Edge
http://adventureblog.nationalgeographic.com/2011/11/17/adventurers-of-the-year-2012-kayakers-jon-turk-and-erik-boomer
Biking the Slow Road from China…. Jun 13, 2016. Beyond the Edge ». Biking Along a Soon-to-Be-Dammed River in…. Jun 9, 2016. Beyond the Edge ». A Surfer’s Reflections From on a…. Jun 8, 2016. Beyond the Edge ». Ultrarunner Scott Jurek on Carbo-Loading, His…. Jun 7, 2016. Beyond the Edge ». Pedaling Along Power Lines in Northern…. Jun 6, 2016. Beyond the Edge ». How to Hike the Backcountry With…. Jun 3, 2016. Beyond the Edge ». One of Yosemite’s Leading Climbers Also…. Jun 2, 2016. Beyond the Edge ». Poste...
esphion.blogs.com
Esphion: Fine-grained filtering - revisited
http://esphion.blogs.com/esphion/2005/10/finegrained_fil.html
Laquo; Anomaly Detection 101. Deep packet inspection - A security risk? October 18, 2005. Fine-grained filtering - revisited. Departing from the usual text-only style of my articles, today I would like to share a picture with you. It came out of an attempt to find a graphical representation of the necessity for fine-grained filters when it comes to the mitigation of network anomalies. I talked about that topic before. The concept I would like to introduce then is the. Smallest Possible Superset (SPS).
esphion.blogs.com
Esphion: The black-market for vulnerabilities
http://esphion.blogs.com/esphion/2006/02/the_blackmarket.html
Laquo; Worms exploring new territories. Firing-Up The Esphion Blog ». February 03, 2006. The black-market for vulnerabilities. My apologies for not posting a new blog entry in such a long time. A busy work schedule, business trips and the holidays thrown in for good measure prevented me from paying as much attention to the blog as I should have. Flaw Merely by visiting a compromised web-site, a user's PC could already be infected. Interestingly, in September of last year I wrote an article. In exactly th...