Blog Stats
- 75,849 hits
Monthly Archives: June 2014
The Norse Hacking Map
At this link, you can watch the world hacking map, hosted by Norse. Apparently back in 2012, the United States was getting attacked at least 10,000,000 times a day. Can you imagine what it is now? 20 million? 40 million? … Continue reading
Posted in Security Blog
Tagged 2014, DDoS, dos, hacking, map, Security Awareness
Comments Off on The Norse Hacking Map
Keren Elazari: Hackers: the Internet’s immune system
Keren gives a great talk about the Internet.
Posted in Security Blog
Tagged 2014, hackers, Keren Elazari, ted
Comments Off on Keren Elazari: Hackers: the Internet’s immune system
PRINCE2 Risk Management
22 minutes of your time and you will learn PRINCE2 Risk Management.
Posted in Security Blog
Tagged 2014, likelihood, probability, risk, risk analysis, risk author, risk category, risk management, risk response
Comments Off on PRINCE2 Risk Management
The Best Defense
The best defense a company can have against cyber and social engineering attacks is have educated people. People who know how to manage systems, people who know how to be cautious, people who know when they need to escalate and … Continue reading
Posted in Security Blog
Tagged 2014, Information Technology Security Awareness, NIST 800-50, Security Awareness
Comments Off on The Best Defense
Phoenix Comicon 2014
Jaime and I were stopped SO many times for pictures. It was a great feeling knowing our costumes we worked hard on were very popular. My brother and sister-in-law got to get their pictures with the one and only Stan … Continue reading
Some CISSP Webcasts
Some CISSP Webcasts that I reviewed last year prior to my test, which I passed in January of 2014. Access Control Telecommunications and Network Security Information Security Governance and Risk Management Application Development Security Cryptography Security Architecture and Design Operations … Continue reading
Posted in CISSP-Study
Tagged 2014, CISSP Study Requirements, video tutorial
Comments Off on Some CISSP Webcasts
OWASP Top 10 Training for CPEs
ISC2 had a link on their website for some motivating, not boring, well maybe a little, OWASP Top 10 training CBTs, provided by Security Compass. If you are doing security code reviews this helps a little, or at least can … Continue reading
Posted in Security Blog
Tagged 2014, cbt, CISSP, computer based training, Continuing Professional Education, cpe, credit, owasp
Comments Off on OWASP Top 10 Training for CPEs