Monthly Archives: January 2017

Pragmatic Cyber Risk Quantification

ISC2 presents Jack Jones, founder of FAIR. Quantitative risk analysis is achievable, can be pragmatic, and can actually out-perform qualitative risk analysis in the face of complex issues like intelligent adversaries. Join Jack Jones, the original author of the Factor … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Pragmatic Cyber Risk Quantification

George Costanza from Seinfeld on Risk Management

An amusing clip on George Costanza becoming a mentor on Risk Management

Posted in Security Blog | Tagged , , , , , , , | Comments Off on George Costanza from Seinfeld on Risk Management

Data Privacy Day

Learn more about Data Privacy Day and lastly an official video

Posted in Security Blog | Tagged , , , , | Comments Off on Data Privacy Day

Along the Lines of Edward Snowden

President Trump put out a communications blackout and now many Federal agencies are leaking information to the press, just like something Edward Snowden would do. Or is it? Most of the resistance is coming from agencies with a focus on … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Along the Lines of Edward Snowden

ID Theft Breach Report in 2016 – 3 Breaches a Day

The Identity Theft Resource Center creates an Annual Data Breach Report and the results are fascinating! There has been 1,093 breaches in 2016, that’s about 3 a day. It should be noted that data breaches are not all alike. Security … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on ID Theft Breach Report in 2016 – 3 Breaches a Day

Giuliani is The President’s Cybersecurity Advisor

Former Mayor Rudy Giuliani has been named the President’s Cybersecurity Advisor. There is a lot of public opinion from infosec and hacker communities alike since Rudy’s website, Giulianisecurity.com, had security vulnerabilities (and now no longer resolves). Giuliani introduced CompStat to the NYPD… … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Giuliani is The President’s Cybersecurity Advisor

President Trump Tech Talk On Cyber. A Supercut

I promise this site is apolitical (not interested or involved in politics) but since I’m about humor and cybersecurity. We have a new President and I know there will be Impact/Magnitude and Likelihood/Frequency of threats to vulnerabilities! That’s risk y’all! … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on President Trump Tech Talk On Cyber. A Supercut

Brilliant Video Showing The Anatomy of An Attack

Cisco made a great video (4 minutes) that I honestly think everyone must see. It breaks down a complex ransomware attack. Picture this happening to your organization. Are you ready for it?

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Brilliant Video Showing The Anatomy of An Attack

The NIST CyberSecurity Framework

According to Gartner, NIST says 30 percent of U.S. organizations used the framework in 2015, and it expects that percentage to grow to 50 percent by 2020.

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on The NIST CyberSecurity Framework