Monthly Archives: April 2014

Gary Warner on TedxBirmingham: Why do we call it CyberCrime?

What is cybercrime? How do we fight cybercrime? Who do we report cybercrime to? Gary Warner tells us his thoughts.

Posted in Security Blog | Tagged , , , , , | Comments Off on Gary Warner on TedxBirmingham: Why do we call it CyberCrime?

XKCD Explains Heartbleed

Posted in Security Blog | Tagged , , , | Comments Off on XKCD Explains Heartbleed

The Heartbleed Hit List

To search this page, press CTRL and F, then type in the site you are about to log into and hit enter. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Heartbleed Hit List

Get Comfortable: @SecureNinjaTV Free Training

Going through my twitter feed, I enjoyed an embedded secureninjatv video and then decided to check out their youtube page. I’ve embedded it for your convenience. There are about 22 videos in the playlist embedded above. Get comfortable, take frequent … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , , , , , , | Comments Off on Get Comfortable: @SecureNinjaTV Free Training

Phoenix ISSA Q2 Meeting

I went to the Phoenix ISSA meeting today, saw some people I used to work with, and also had a short refresher in PCI and got a few good tips on where to look for creating a MDM solution that … Continue reading

Posted in Security Blog | Tagged | Comments Off on Phoenix ISSA Q2 Meeting

The Nano UAV, Black Hornet PD100

This is the future tool for the military. I predict that very soon, drones will be part of every type of business. Some businesses such as insurance, use drones to assess damage to roofs, sending the video feeds to claims … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on The Nano UAV, Black Hornet PD100

The Art of Cyberwar

This was a great presentation at the DefCon 20, tying together CyberWarfare and Sun Tzu’s Art of War.. Sun Tzu was a Chinese military general, strategist, and philosopher. The gentleman presenting is Dr. Kenneth Geers, an NCIS Cyber Subject Matter … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Art of Cyberwar

Interactive Cyber Threat Map

The Kapersky Cyberthreat real-time map is pretty flashy.

Posted in Security Blog | Tagged , , , , , | Comments Off on Interactive Cyber Threat Map

Security for IoT

A good awareness video in regards to the Internet of Things.

Posted in Security Blog | Tagged , , , , , | Comments Off on Security for IoT

What’s New with PCI DSS 3.0

Posted in Security Blog | Tagged , , , | Comments Off on What’s New with PCI DSS 3.0