This is Alexandre Cezar's Typepad Profile.
Join Typepad and start following Alexandre Cezar's activity
Join Now!
Already a member? Sign In
Alexandre Cezar
Recent Activity
Hi David, You´re right. Change the user culture isn´t a easy task. Far from it... But I believe that this cultural change must come, and for some people it´ll come naturally through specific awareness training. For others it´ll come by need. Knowing that they´re accountable for their actions will make them more responsible too.
Toggle Commented Dec 2, 2012 on Making the users accountable at (ISC)2 Blog
We all know that information security relays on a layered approach. It´s about people, process/programs and technology. And we all know about Advanced Persistent Threats. How they work, attack vectors, etc. And even so, more and more companies are attacked... Continue reading
Posted Nov 30, 2012 at (ISC)2 Blog
Image
It's widely known by now, that the Internet group called "Anonymous" is targeting an amplification attack against the DNS Root Servers. Much has been said about it and different people have different opinions. Here's mine. To get to my point... Continue reading
Posted Mar 19, 2012 at (ISC)2 Blog
I had the opportunity to visit several companies over the years and in many cases I could verify that their network and security teams suffered of a lack of network visibility, which let them unable to answer some important questions,... Continue reading
Posted Oct 24, 2011 at (ISC)2 Blog
Well, IPV4 addresses are almost depleted, right? Sort of, it´s clear that we will be out of IPv4 addresses in 2011, some actual almost "live" info I received mentioned that we had left only 12/8’s and 11/256’s by the end... Continue reading
Posted May 31, 2011 at (ISC)2 Blog
In the after-crisis of the Stuxnet worm, Governments around the world are mobilizing to be better prepared against CyberThreats and CyberWar. It's becoming clear, more and more that groups pf individuals with a lot of knowledge, time and motivation can... Continue reading
Posted Jan 31, 2011 at (ISC)2 Blog
Wellcome to Shodan. If you're thinking "What on Earth is it?", please read the lines below. If you're already familiar with, move to the next Section. So here’s the basic: SHODAN (Sentient Hyper-Optimized Data Access Network) is a search engine,... Continue reading
Posted Nov 5, 2010 at (ISC)2 Blog
I received some emails lately asking me some advice on how to prove a SIEM Tool ROI to higher management (justify acquisition, prove that the solution helps, etc). If you focus only in the technical aspects, I admit thatlife becomes... Continue reading
Posted Sep 18, 2010 at (ISC)2 Blog
I'm scared!!! With one subject! Why people are not concerned about exposing their lives on the Internet? On a way that can put in danger not only themselves but their family and friends. I'm writing below some info I collected... Continue reading
Posted Mar 29, 2010 at (ISC)2 Blog
I was reading a interesting discussion on Linked-In days ago about security technologies tendencies and I became happy to read about some very interesting solutions/technologies that I never heard about it and some others I'm more familiar but with a... Continue reading
Posted Jan 31, 2010 at (ISC)2 Blog
A while ago the company I work for was hired for a Telecom company to secure their data centers. During the initial gap analysis phase, the backbone was hit by a DDos attack and of course we were assigned to... Continue reading
Posted Oct 30, 2009 at (ISC)2 Blog
After a long absence due to long and stressful project "46 hours working straight was common" I'm back Sure, I missed to blog here!!! I'm reading a lot about Cloud Computing and how fantastic it is, but I have to... Continue reading
Posted Sep 24, 2009 at (ISC)2 Blog