Showing posts with label Book Review. Show all posts
Showing posts with label Book Review. Show all posts

Monday, September 26, 2011

Really, really excited....


Sorry, it's been so long folks but I've been a bit busy this week.  For starters, my request to test and evaluate products sold by Victory Defense was granted and we'll be taking a look at a few gadgets with security applications.  One such gadget is a tactical flashlight with video and audio recording capability!  Now, do you see why I'm so excited? Secondly, we'll have articles about behavioral video analytics versus rules-based analytics.  If you've been following my Twitter feed, you probably noticed I was quite curious about the difference between the two and what failures behavioral analysis has.  I'm going to attempt to get a hold of someone at BRS Labs the company on the forefront of behavioral analytics to discuss this more.  We'll also have a commentary on what I perceive to be the most prevalent source of failure in any security program.  I conducted a poll on LinkedIn about a month ago regarding this very issue and the responses I got were quite surprising and enlightening in many respects.  Finally, I also hope to have an interview with an Executive Protection agent to discuss their journey into the field, the types of projects they've done, and where they see this subsection of our industry going.  As an added bonus, I'll be publishing a video on last week's topic on proper ways to search/inspect bags in a security environment.  As you can see, I've been a bit busy getting content.  It is my goal to move towards more original content.   So stay tuned and welcome back to The Security Dialogue.

Sunday, March 16, 2008

Book Review - The Art Of Deception



Well....I finally did it. I finally finished Kevin Mitnick's book, The Art Of Deception. This was perhaps one of the most compelling books I've read in a very long time. It covers ways into which many of our corporations and government agencies are vulnerable. It details what was once thought of as "old-school" techniques in which information thieves gain insight into the very workings of these organizations such as dumpster diving and pretexting.

The book is 352 pages of real-life examples of Mitnick's former operation and those of his former comrades. I particularly liked his ideas about how we can protect from these attacks. Some would think this would be an opportunity for Mitnick to brag and thumb his nose at his former adversary, the US government. But it isn't. It is certainly a guide into some very low-tech means in which these guys operate and exploit.

This book is a must-read for anybody who cares about security. I would suggest this for any reader who wants to protect themselves or their organizations. If you think you're not vulnerable, hire an outside firm to do a penetration test on your people not your systems and see where your vulnerabilities are. I can tell you from my experience, the best way to defend yourself is to protect your people. Your systems need people to operate and maintain them. If your folks fail to perform the basic due diligence when dealing with anyone seeking information or access (either physical or virtual) into your organization, then you better get them doing it ASAP. If you're in charge of security for any corporation, I HIGHLY suggest this book.

About Us