Following the Wh1t3 Rabbit - Practical Enterprise Security

Enterprise Security organizations often find themselves caught between the ever-changing needs of the agile business, and the ever-present, ever-evolving threats to that business. At the same time – all too often we security professionals get caught up in “shiny object syndrome” which leads us to spend poorly, allocate resources unwisely, and generally de-couple from the organization we’re chartered to defend. Knowing how to defend begins with knowing what you’ll be defending, why it is worth defending, and who you’ll be defending from… and therein lies the trick. This blog takes the issue of enterprise security head-on, challenging outdated thinking and bringing a pragmatic, business-aligned, beyond the tools perspective … so follow the Wh1t3 Rabbit and remember that tools alone don’t solve problems, strategic thinkers are the key.

Rafal (Principal, Strategic Security Services)

Is Truly Anonymous Web Browsing Possible?

"The problem with losing your anonymity is that you can never go back."   --Marla Maples

 

There's anonymity, and then there's being anonymous.

 

Oddly enough the line is a lot more difficult to understand then one may wish.  Anonymity is a tricky thing because on one end of the argument you must concede that in order to have an acceptable user experience in the modern web world you must be tracked to some acceptable extent, while the other end of the argument would say that we don't want web sites, vendors and nation-states/organizations tracking us and our browsing habits.  Throwing into this the complexity of free content (what's really "free" today, really?) like FaceBook and other types of free-for-a-fee sites and you have yourself an ugly little mess.

 

So what are the issues?

Search
About the Author(s)
Follow Us
Twitter Stream


Community Announcements
HP Blog

Technical Support Services Blog

Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation