Microsoft’s detective

Just over a year ago, when I went through the logs of an IPS located at a dedicated and internal network (not facing the Internet or any external networks), I saw DHCP activity. Since this is a servers based environment, presumably they all should have a fixed IP address, so any DHCP activity may indicate ...

A thought about the essence of vulnerability

  I would like to offer slightly differently way of thinking about the concept of vulnerability. Vulnerability, in the context of information security, refers to one or more weaknesses, and following its exploitation, the probability of damaging data or information systems and/or processes. Vulnerability as a concept, originates from the human life, of human weakness ...

Opening post

Well, we have to start somewhere. So let’s start here. My name is Eitan Caspi, from Israel. You will find more information about me and this blog at the “About” page. Information Security is my main thing, both at work and as a hobby, for the last, say, 14 years. Like many things in my ...