Blog Stats
- 75,849 hits
Monthly Archives: March 2014
AAA: Getting Roadside Assistance from Tripwire
There is this webcast tomorrow. Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey: beginning with a small implementation of Tripwire, then running into roadblocks by Management for the expansion of products, and eventually … Continue reading
Posted in Security Blog
Tagged 2014, compliance, PCI Compliance, tripwire, webcast
Comments Off on AAA: Getting Roadside Assistance from Tripwire
Pat’s 30th in Vegas
Happy 30th birthday Pat!!! Here are some of the photos, just the ones that I took. Uncle Dave will send me his pictures, probably when he gets an iPhone. It was a lot of fun and we had a great … Continue reading
Posted in life
Comments Off on Pat’s 30th in Vegas
Yesterday’s SEC Cybersecurity Roundtable
The Securities and Exchange Commission host a cybersecurity roundtable. Roundtable panelists will discuss the cybersecurity landscape and cybersecurity issues faced by exchanges and other key market systems, broker-dealers, investment advisers, transfer agents, and public companies. Panelists also will be invited … Continue reading
Posted in Security Blog
Tagged 2014, cybercrime, Cybersecurity Roundtable, discussions, Government, roundtable, sec, securities and exchange commission
Comments Off on Yesterday’s SEC Cybersecurity Roundtable
Dark Reading
Are you a cyber-security professional? Then you probably already know this about The New Dark Reading Information Security Community. If not… Consider yourself informed. You’re welcome!
Posted in Security Blog
Tagged 2014, compliance, cyber-security problems, Dark Reading, hackers, risk management, security professionals
Comments Off on Dark Reading
Hacker Drones Stealing your Info
Yet another video on attaching some hacking equipment to a drone. The mobile Internet devices such as phones, tablets, and laptops will always be in need of protection and honestly, the inventors can only do so much. Companies require administrative … Continue reading
Posted in Security Blog
Tagged 2014, drone, drones, hacking, phishing, pineapple, quadcopter, sniffing, spoofing
Comments Off on Hacker Drones Stealing your Info
The Cloud Ate My Homework
Years ago, while in college, we sometimes had a great excuse that the files on our floppy disk were corrupted somehow on days that we had to turn in our papers or to give a presentation.
Sell it to the NSA
Give it away for free. Profit!!
Bennett Arron: How to Steal an Identity
Bennett Arron. Bennett is a stand-up comedian, award-winning writer and a major victim of Identity Theft. Years after having his identity stolen – which resulted in his losing everything – he wrote a comedy show about his experience. The video … Continue reading
Posted in Security Blog
Tagged 2014, Bennett Arron, Identity Theft, social engineering, video tutorial
Comments Off on Bennett Arron: How to Steal an Identity