Oh wait, this is the real world! All those vulnerability-centric measures I just described are what too many "security professionals" would recommend. Instead, police identified the criminals and arrested them. From Teen burglary ring in Manassas identified:
Two suspects questioned Friday gave information about the others, police said.
Now this crew is facing prosecution. That's a good example of what we need to do in the digital world: enable and perform threat-centric security. We won't get there until we have better attribution, and interestingly enough attribution is the word I hear most often from people pondering improvements in network security.


As I write this post I'm reminded of
One of the presentations I delivered at the 
Last year at this time I wrote a series of posts on
I was asked to help locate two candidates for positions in the 


Thanks to everyone who attended the