Monthly Archives: March 2014

AAA: Getting Roadside Assistance from Tripwire

There is this webcast tomorrow. Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey: beginning with a small implementation of Tripwire, then running into roadblocks by Management for the expansion of products, and eventually … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on AAA: Getting Roadside Assistance from Tripwire

An Oldie, but a Goodie: An Intro to Armitage

Rob Fuller, aka Mubix, created Armitage, a cool gui to work with Metasploit. Here is a demo on using this tool. At the time of this posting, the video is over 3 years old.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on An Oldie, but a Goodie: An Intro to Armitage

Pat’s 30th in Vegas

Happy 30th birthday Pat!!! Here are some of the photos, just the ones that I took. Uncle Dave will send me his pictures, probably when he gets an iPhone. It was a lot of fun and we had a great … Continue reading

Posted in life | Comments Off on Pat’s 30th in Vegas

Yesterday’s SEC Cybersecurity Roundtable

The Securities and Exchange Commission host a cybersecurity roundtable. Roundtable panelists will discuss the cybersecurity landscape and cybersecurity issues faced by exchanges and other key market systems, broker-dealers, investment advisers, transfer agents, and public companies. Panelists also will be invited … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Yesterday’s SEC Cybersecurity Roundtable

Dark Reading

Are you a cyber-security professional? Then you probably already know this about The New Dark Reading Information Security Community. If not… Consider yourself informed. You’re welcome!

Posted in Security Blog | Tagged , , , , , , | Comments Off on Dark Reading

Hacker Drones Stealing your Info

Yet another video on attaching some hacking equipment to a drone. The mobile Internet devices such as phones, tablets, and laptops will always be in need of protection and honestly, the inventors can only do so much. Companies require administrative … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hacker Drones Stealing your Info

The Cloud Ate My Homework

Years ago, while in college, we sometimes had a great excuse that the files on our floppy disk were corrupted somehow on days that we had to turn in our papers or to give a presentation.

Posted in Security Blog | Tagged , | Comments Off on The Cloud Ate My Homework

Bart Simpson on Security Awareness

Posted in Security Blog | Tagged , , , | Comments Off on Bart Simpson on Security Awareness

Sell it to the NSA

Give it away for free. Profit!!

Posted in Security Blog | Tagged , , , | Comments Off on Sell it to the NSA

Bennett Arron: How to Steal an Identity

Bennett Arron. Bennett is a stand-up comedian, award-winning writer and a major victim of Identity Theft. Years after having his identity stolen – which resulted in his losing everything – he wrote a comedy show about his experience. The video … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Bennett Arron: How to Steal an Identity