Search Results for: 2 factor

The Verizon 2014 Data Breach Investigations Report

For the whole 60 page report, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf. For the 8 page Executive Summary, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_dbir-2014-executive-summary_en_xg.pdf There are seven common themes: Be vigilant. Organizations often only find out about security breaches when … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Verizon 2014 Data Breach Investigations Report

2. Exam Essentials for Access Control Attacks and Monitoring

Understand basic risk elements Risk is the likelihood that a threat can exploit a vulnerability and cause damage to assets. Asset valuation identifies the value of assets Threat modeling identifies threats against these assets Vulnerability analysis identifies weaknesses in an … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 2. Exam Essentials for Access Control Attacks and Monitoring

LinkedIn Phishing

There has been a lot of phishing emails claiming to be from LinkedIn Support, designed to fool recipients into giving up their login credentials. The email uses a lowercase I instead of a capital i when spelling ‘Linkedln’ I promote … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on LinkedIn Phishing

Tombstone Wedding

Our friend Leanne married her best friend, Dylan, who coincidentally is the twin of our of our cosplay friend, Johanna. We stayed in Tombstone for the wedding, which was super cute. Unfortunately, I had to work due to a world … Continue reading

Posted in Event, life | Tagged , , , , | Comments Off on Tombstone Wedding

FAIR (OpenFAIR Certified)

I took a class that Risklens teaches on the Factor Analysis of Information Risk. I really enjoyed the class. It was very good. That and I’ve been taught by Jack in the past… like 14 years ago when we were … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on FAIR (OpenFAIR Certified)

Pragmatic Cyber Risk Quantification

ISC2 presents Jack Jones, founder of FAIR. Quantitative risk analysis is achievable, can be pragmatic, and can actually out-perform qualitative risk analysis in the face of complex issues like intelligent adversaries. Join Jack Jones, the original author of the Factor … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Pragmatic Cyber Risk Quantification

LinkedIn Breach Data Leaked

Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on LinkedIn Breach Data Leaked

Bad News, Good News

It’s with a heavy heart to announce that Jaime’s Uncle, Forrest, passed away during the night. I didn’t find out until I got back from my morning run. He was a great guy and really funny. We’ll miss him. After … Continue reading

Posted in life | Comments Off on Bad News, Good News

NSA’s XKeyscore

The NSA has their own version of Google. It collects, supposedly, way more information than the search giant. The NSA system pulls in countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on NSA’s XKeyscore

Five Habits to be Unhackable

By simply adopting these five habits of practically unhackable people, you too can have better security. Think before you click. 95% of hacks are the result of clicking bad links, so make sure to check that it’s the right URL and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Five Habits to be Unhackable