Articles
A Model for Evaluating Breach Detection Readiness
4 min read
Given that modern attacks are complex and sophisticated, there is not a single product or tool that will ever be 100% effective at detecting threats. Prevention eventually fails. Therefore, you need protection before, during, and after an attack. Modern-day networks are large and complicated. It is a nightmare for incident response teams and security investigators […]
Exciting Fourth Edition of SecCon-X Bangalore
1 min read
The week of November 10 was filled with learning and excitement for security technology enthusiasts at Cisco's Bangalore campus as people gathered for SecCon-X 2014, Cisco's largest annual cross-company...
Open Sourcing FNR an Experimental Block Cipher
1 min read
Traditional block ciphers work on fixed blocks of data—as an example, AES is well-defined for 128/192/256 bits. But one of the issues is the need for padding—so if you need to encrypt small amounts of data you may end with a huge difference in input vs. output size. As an example, using AES/128 on ECB […]
Embracing Security Related User Groups
2 min read
Security is a tough nut that can’t be cracked by one alone—neither technology nor research, neither corporations nor start-ups, and neither products nor processes. None of these alone can crack the security nut. The most important part of the problem and solution is people! Nothing beats the efforts of few passionate people collaborating for a cause.
1