Category Archives: Security Blog

Stock Photo Hackers

Posted in Security Blog | Tagged , , | Comments Off on Stock Photo Hackers

RSA Archer and GRC

Yesterday I gave a presentation on RSA Archer and GRC at a lunch and learn. I got a lot of some lovely compliments. Topics were focused on Governance and Risk Frameworks, and processes.

Posted in Security Blog | Tagged , , , , , , | Comments Off on RSA Archer and GRC

Booked for Nashville TN

It has been many years since I lived in Millington Tennessee, I was stationed at the Naval Air Station there for Ordnance school in 1992. A fresh 18 year old, just gaining independence and I probably could have used a … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Booked for Nashville TN

Choosing a Security Framework

I had a conversation about this topic the other day, so I was pretty happy to stumble upon this video.

Posted in Security Blog | Tagged , , , , | Comments Off on Choosing a Security Framework

Worst Passwords of 2017

Every year SplashData analyses passwords leaked by hackers in data breaches. Here is this year’s list: 1. 123456 2. password 3. 12345678 4. qwerty 5. 12345 6. 123456789 7. letmein 8. 1234567 9. football 10. iloveyou 11. admin 12. welcome … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Worst Passwords of 2017

Net Neutrality

Net neutrality is the principle that Internet service providers must treat all data on the Internet the same, and not discriminate or charge differently by user, content, website, platform, application, type of attached equipment, or method of communication. For instance, … Continue reading

Posted in Security Blog | Tagged , | Comments Off on Net Neutrality

Re:Scam.Bot

Next time you get sent a scam email FORWARD it me@rescam.org, created by Netsafe as a sophisticated A.I. email program to keep bad guys busy. The A.I. will reply to the bad guys with conversation and keep them busy until … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Re:Scam.Bot

Facebook Photo Analysis

I was having some connectivity issues at the hotel I was staying at recently, while I was checking out how many likes I got on my photos in my post on Facebook. Some pictures weren’t loading and I was shocked… … Continue reading

Posted in Security Blog | Tagged | Comments Off on Facebook Photo Analysis

More On Equifax with John Oliver

I think that a big slap in the face to the American people is that Equifax was also awarded 7.25 million by the IRS to verify taxpayer identities and help prevent fraud.

Posted in Security Blog | Tagged , , , , , | Comments Off on More On Equifax with John Oliver

It’s National CyberSecurity Awareness Month

Learn about potential extreme hackerness from an extreme, fictional story. The hacker uses social engineering tactics and hacks into many things in Pierce Brosnan’s character, Mike Regan’s life and tries to ruin every aspect of his life. It’s a crazy … Continue reading

Posted in Security Blog | Tagged , | Comments Off on It’s National CyberSecurity Awareness Month