Rationalsurvivability - rationalsurvivability.com - Rational Survivability
General Information:
Latest News:
The Curious Case Of Continuous and Consistently Contiguous Crypto… 9 Aug 2013 | 01:31 am
Here’s an interesting resurgence of a security architecture and an operational deployment model that is making a comeback: Requiring VPN tunneled and MITM’d access to any resource, internal or extern...
Incomplete Thought: The Psychology Of Red Teaming Failure – Do Not Pass Go… 7 Aug 2013 | 12:02 am
team fortress red team (Photo credit: gtrwndr87) I could probably just ask this of some of my friends — many of whom are the best in the business when it comes to Red Teaming/Pen Testing, but I thoug...
Incomplete Thought: In-Line Security Devices & the Fallacies Of Block Mode 29 Jun 2013 | 12:59 am
The results of a long-running series of extremely scientific studies has produced a Metric Crapload™ of anecdata. Namely, hundreds of detailed discussions (read: lots of booze and whining) over the l...
An Ode To Glass 19 May 2013 | 09:55 am
Google Glasses reviewed, often spiced with profanity A technology, profound, previews dystopic humanity Augmentation, extension, lensless optics you blink through Winking gestures, #hashtagged p...
Video Of My ’12 Microsoft Bluehat Talk: Sh*t My Cloud Evangelist Says 11 Apr 2013 | 05:57 am
For those of you who haven’t seen me speak, Bluehat generally brings out the best in me and happens to capture it on video and make it available for you! Here you go (link if you can’t see the embedd...
Intel TPM: The Root Of Trust…Is Made In China 22 Feb 2013 | 11:56 pm
This is deliciously ironic. Intel‘s implementation of the TCG-driven TPM — the Trusted Platform Module — often described as a hardware root of trust, is essentially a cryptographic processor that all...
Incomplete Thought: Where Is the Technology Disruption Forcing REAL Change In Security? 25 Jan 2013 | 04:23 am
In the networking world, we’ve seen how virtualization technologies and operational models such as cloud have impacted the market, vendors and customers in what amounts to an incredibly short span of ...
Wanna Be A Security Player? Deliver It In Software As A Service Layer… 10 Jan 2013 | 10:48 am
As I continue to think about the opportunities that Software Defined Networking (SDN) and Network Function Virtualization (NFV) bring into focus, the capability to deliver security as a service layer ...
NIST’s Trusted Geolocation in the Cloud: PoC Implementation 23 Dec 2012 | 04:39 am
I was very interested and excited to learn what NIST researchers and staff had come up with when I saw the notification of the “Draft Interagency Report 7904, Trusted Geolocation in the Cloud: Proof o...
On Puppy Farm Vendors, Petco and The Remarkable Analog To Security Consultancies/Integrators… 6 Dec 2012 | 04:31 am
Funny Attention Dogs And Owners Sign (Photo credits: www.dogpoopsigns.com) Imagine you are part of a company in the “Pet Industry.” Let’s say dogs, specifically. Imagine further that regardless of ...