var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-35754314-2']); _gaq.push(['_setDomainName', 'securityeverafter.com']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();

Saturday, May 30, 2015

Weekend Learning - Spoofer Project

I recently posted the below on the SANS Internet Storm Center.

Happy weekend, everyone. Often times there is extra margin on the weekends to learn something new. This weekend I encourage you to consider learning more about the Spoofer project, as recommended by a fellow ISC Handler. With the recent announcement that the Spoofer project is funded and has clients for multiple operating systems, I encourage you to put this project on your weekend "to do list”.
 
As a visual learner, I found their summary report listing the current state of source address spoofing compelling. As we all strive to improve our Cyber Security posture, efforts theSpoofer project plays a role in improving our "Cyber Hygiene”.

No comments:

Post a Comment