Interview with Ed Skoudis, author of "Counter Hack"
by Mirko Zorz - Tuesday, 18 February 2003.
Bookmark and Share
After that, admins needs to know how to check their systems for anomalous activities. They need to understand how to detect sniffers, rootkits, backdoors, and other tools used by the bad guys.

What is, in your opinion, the biggest challenge in protecting sensitive information at the enterprise level?

The overwhelming flood of patches to fix vulnerabilities is very difficult to deal with. We actually have data glut, with a constant flow of vulnerability notices, threat indications, attack detection, and so on. It's hard keeping up with all of this information, and figuring out what is really important.

What are your future plans? Any exciting new projects?

I'm working on another book. This next tome will be more focused on specific attacks than the last one. I'm pretty excited about it.

Additionally, I write monthly "Crack the Hacker" challenges to test readers' knowledge of handling various computer attack scenarios. I write up a scenario based on some movie theme, and pose various questions at the end. So far, I've written Spider-Hack, Hack to the Future, How the Grinch Hacked Christmas, and many others. They are located at counterhack.net.

Spotlight

What does the future hold for cloud computing?

Posted on 21 July 2014.  |  Cloud computing’s widespread adoption by businesses and consumers alike all but guarantees that, in five to ten years’ time, the technology will still be very much with us.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Jul 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //