Monthly Archives: April 2014

What Can InfoSec Learn from Video Games?

Dwayne Melancon the Chief Technology Officer at Tripwire Adventure games make it easy for us to understand how our skills, weapons and countermeasures match up to the threats we expect to face. In this session, we’ll discuss models and lessons … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on What Can InfoSec Learn from Video Games?

Kali Linux on your Android Phone

Though I’ve yet to find the ARM packages to install BackTrack on a Kali Linux Chromebook, I did find this awesome tutorial on installing Kali Linux on Android. You may want to get a larger memory card prior to installing … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Kali Linux on your Android Phone

Information Security Awareness Crossword

Cute, found it online. Try it out!

Posted in Security Blog | Tagged , , , | Comments Off on Information Security Awareness Crossword

Digital Profile

Ubisoft created a video game called Watch Dogs, though some of the threats may be far reaching in their risk analysis, if you have a Facebook profile and are active on it, try out the Digital Shadow. I can appreciate … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Digital Profile

Damien Working?

Damien got a job offer from our neighbor and friend Preston, to work a carnival. Of course they both asked me if it was OK. So I just dropped Damien off at the University of Phoenix Stadium to work at … Continue reading

Posted in life | Comments Off on Damien Working?

The Verizon 2014 Data Breach Investigations Report

For the whole 60 page report, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf. For the 8 page Executive Summary, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_dbir-2014-executive-summary_en_xg.pdf There are seven common themes: Be vigilant. Organizations often only find out about security breaches when … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Verizon 2014 Data Breach Investigations Report

Not a CISSP? After Watching This, You’ll Want to be. Already One?

The C, I, double S, P

Posted in Security Blog | Tagged , , , | Comments Off on Not a CISSP? After Watching This, You’ll Want to be. Already One?

Dr. Steven Bagley: Heartbleed Code

In this video, which I found through links on Facebook, Dr. Steven Bagley runs the Heartbleed code to show exactly how the exploit works. Also, here is a website that may give you some audit capabilities. http://www.garage4hackers.com/blog.php?b=2551

Posted in Security Blog | Tagged , , , , | Comments Off on Dr. Steven Bagley: Heartbleed Code

KPMG on GRC

A somewhat vendor neutral animation on GRC to help make informed decisions.

Posted in Security Blog | Tagged , , , , , | Comments Off on KPMG on GRC

Service Now and IT GRC

Because some people struggle with GRC and have multiple tools, the video is a quick, short video on tying GRC together with one of the many packages out there. Plus, hey, stop motion animation!

Posted in Security Blog | Tagged , , , , , | Comments Off on Service Now and IT GRC