Blog Stats
- 75,649 hits
Monthly Archives: April 2014
What Can InfoSec Learn from Video Games?
Dwayne Melancon the Chief Technology Officer at Tripwire Adventure games make it easy for us to understand how our skills, weapons and countermeasures match up to the threats we expect to face. In this session, we’ll discuss models and lessons … Continue reading
Posted in Security Blog
Tagged 2014, diablo, information security, video games
Comments Off on What Can InfoSec Learn from Video Games?
Kali Linux on your Android Phone
Though I’ve yet to find the ARM packages to install BackTrack on a Kali Linux Chromebook, I did find this awesome tutorial on installing Kali Linux on Android. You may want to get a larger memory card prior to installing … Continue reading
Posted in Security Blog
Tagged 2014, android, backtrack, chromebook, kali
Comments Off on Kali Linux on your Android Phone
Information Security Awareness Crossword
Cute, found it online. Try it out!
Posted in Security Blog
Tagged 2014, crossword, Information Technology Security Awareness, puzzle
Comments Off on Information Security Awareness Crossword
Digital Profile
Ubisoft created a video game called Watch Dogs, though some of the threats may be far reaching in their risk analysis, if you have a Facebook profile and are active on it, try out the Digital Shadow. I can appreciate … Continue reading
Posted in Security Blog
Tagged 2014, digital profile, digital shadow, privacy, risk management, ubisoft, video game, watchdogs
Comments Off on Digital Profile
Damien Working?
Damien got a job offer from our neighbor and friend Preston, to work a carnival. Of course they both asked me if it was OK. So I just dropped Damien off at the University of Phoenix Stadium to work at … Continue reading
Posted in life
Comments Off on Damien Working?
The Verizon 2014 Data Breach Investigations Report
For the whole 60 page report, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf. For the 8 page Executive Summary, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_dbir-2014-executive-summary_en_xg.pdf There are seven common themes: Be vigilant. Organizations often only find out about security breaches when … Continue reading
Posted in Security Blog
Tagged 2014, data breaches, investigations, report, verizon
Comments Off on The Verizon 2014 Data Breach Investigations Report
Not a CISSP? After Watching This, You’ll Want to be. Already One?
The C, I, double S, P
Posted in Security Blog
Tagged 2014, CISSP, Information Technology Security Awareness, lol
Comments Off on Not a CISSP? After Watching This, You’ll Want to be. Already One?
Dr. Steven Bagley: Heartbleed Code
In this video, which I found through links on Facebook, Dr. Steven Bagley runs the Heartbleed code to show exactly how the exploit works. Also, here is a website that may give you some audit capabilities. http://www.garage4hackers.com/blog.php?b=2551
Posted in Security Blog
Tagged @computer_phile, 2014, Dr. Steven Bagley, Heartbleed, openssl
Comments Off on Dr. Steven Bagley: Heartbleed Code
KPMG on GRC
A somewhat vendor neutral animation on GRC to help make informed decisions.
Posted in Security Blog
Tagged 2014, compliance, governance, grc, kpmg, risk
Comments Off on KPMG on GRC
Service Now and IT GRC
Because some people struggle with GRC and have multiple tools, the video is a quick, short video on tying GRC together with one of the many packages out there. Plus, hey, stop motion animation!
Posted in Security Blog
Tagged 2014, compliance, governance, grc, risk, service now
Comments Off on Service Now and IT GRC