For some time now, when we reverse scans on networks, originators of phishing attacks and other types of illicit network traffic we’ve found so often that the trail ends at the Great Wall of China. Basically, if the IP address is a Chinese IP then more than likely you will never have anything done, never get a response from an inquiry and essentially be laughed at if you do anything more than block the IP or the subnet. It has gotten to the point where when you see those entries in the logs or in reports you in fact think, this must be some drive-by and while you give the…
-
-
The New CTO
One of my favorite parts of my job is to act as an outsourced CTO for companies. In some cases it is more of acting as lateral support for incumbent CIO/CSO types, which actually works out really well in a number of cases. In those cases I really more help to define the technical guidance for organizations. In some cases the organization is too small for a C-level and it’s more of acting as a Director of IT, in others it’s simply as a supplement to another C-level for dispute resolution. And like many CTOs I once focused on computers, servers and backbones. But how quickly technology can redefine an…