Analytics

Analytical tools configure and use threat detection, perform data analysis, interprets the results to identify vulnerabilities, notifies the threats and risks to an organization with the end goal of securing and protecting applications and systems within an organization. We are now able to apply behavioral analytics to the IT security market to improve the overall state of IT security. Analytics have been successfully integrated into the business intelligence, retail, and financial services industries for decades and are now being applied to IT security. Cyber security analytics greatly improves threat visibility across a broad attack surface by focusing on network behavior, including an organization’s interior network.

Posted in My Blog | Leave a comment

White Hat vs. Black Hat

      In the information security world, your hat color corresponds with your intentions. If you are on protection or “good” side of the spectrum then you are known to be a white hat hacker. If you are on the malicious or “bad” side of the spectrum then you are known to be a black hat hacker. If you are in between or in the “neutral” area of the spectrum then you would be known as a gray hat hacker. Other vernacular may be white hatter, gray hatter, or black hatter.

      There are those that may be defined by being in between gray and white or gray and black. I have heard many people in the community call these hackers by many different terms. I like to use my own terms which are simple and easy to remember. A hacker that is between the gray and white hat: I like to call these folks “light gray hat hackers” or light gray hatters. A hacker that is between the black and white hat: I like to call these folks “dark gray hat hackers” or dark gray hatters.

Posted in My Blog | Tagged | Leave a comment