November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,642 hits
Search Results for: 2 factor
The Verizon 2014 Data Breach Investigations Report
For the whole 60 page report, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf. For the 8 page Executive Summary, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_dbir-2014-executive-summary_en_xg.pdf There are seven common themes: Be vigilant. Organizations often only find out about security breaches when … Continue reading
Posted in Security Blog
Tagged 2014, data breaches, investigations, report, verizon
Comments Off on The Verizon 2014 Data Breach Investigations Report
2. Exam Essentials for Access Control Attacks and Monitoring
Understand basic risk elements Risk is the likelihood that a threat can exploit a vulnerability and cause damage to assets. Asset valuation identifies the value of assets Threat modeling identifies threats against these assets Vulnerability analysis identifies weaknesses in an … Continue reading
Posted in CISSP-Study
Tagged 2013, Access Control Attacks and Monitoring, CISSP Study Requirements
Comments Off on 2. Exam Essentials for Access Control Attacks and Monitoring
LinkedIn Phishing
There has been a lot of phishing emails claiming to be from LinkedIn Support, designed to fool recipients into giving up their login credentials. The email uses a lowercase I instead of a capital i when spelling ‘Linkedln’ I promote … Continue reading
Posted in Security Blog
Tagged 2 factor, 2015, linkedin, passwords, phishing, social engineering, two-factor
Comments Off on LinkedIn Phishing
Tombstone Wedding
Our friend Leanne married her best friend, Dylan, who coincidentally is the twin of our of our cosplay friend, Johanna. We stayed in Tombstone for the wedding, which was super cute. Unfortunately, I had to work due to a world … Continue reading
FAIR (OpenFAIR Certified)
I took a class that Risklens teaches on the Factor Analysis of Information Risk. I really enjoyed the class. It was very good. That and I’ve been taught by Jack in the past… like 14 years ago when we were … Continue reading
Posted in Security Blog
Tagged achievement unlocked, fair, OpenFAIR
Comments Off on FAIR (OpenFAIR Certified)
Pragmatic Cyber Risk Quantification
ISC2 presents Jack Jones, founder of FAIR. Quantitative risk analysis is achievable, can be pragmatic, and can actually out-perform qualitative risk analysis in the face of complex issues like intelligent adversaries. Join Jack Jones, the original author of the Factor … Continue reading
Posted in Security Blog
Tagged 2016, 2017, cyber risk, factor analysis information risk, fair, risk, risk management
Comments Off on Pragmatic Cyber Risk Quantification
LinkedIn Breach Data Leaked
Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading
Posted in Security Blog
Tagged 2 factor, 2-step, 2012, 2016, 2fa, cybercrime, hacked, hackers, information security, linkedin, passwords, security, Security Awareness, two-factor
Comments Off on LinkedIn Breach Data Leaked
Bad News, Good News
It’s with a heavy heart to announce that Jaime’s Uncle, Forrest, passed away during the night. I didn’t find out until I got back from my morning run. He was a great guy and really funny. We’ll miss him. After … Continue reading
Posted in life
Comments Off on Bad News, Good News
NSA’s XKeyscore
The NSA has their own version of Google. It collects, supposedly, way more information than the search giant. The NSA system pulls in countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a … Continue reading
Five Habits to be Unhackable
By simply adopting these five habits of practically unhackable people, you too can have better security. Think before you click. 95% of hacks are the result of clicking bad links, so make sure to check that it’s the right URL and … Continue reading
Posted in Security Blog
Tagged 2015, information security, Information Technology Security Awareness, privacy, Security Awareness
Comments Off on Five Habits to be Unhackable