Tag Archives: 2014

Cyber Risk Trends

Hear Chubb’s worldwide cyber risk manager Ken Goldstein discuss the perceptions of private company senior managers about their company’s exposure to data breaches, as revealed by recent findings from the Chubb 2013 Private Company Risk Survey.

Posted in Security Blog | Tagged , , , , | Comments Off on Cyber Risk Trends

HIPAA

I’ve convinced my boss to turn down candidates who spell HIPAA as HIPPA. Especially if they work in healthcare. Who in the payment card industry misspells PCI?

Posted in Security Blog | Tagged , | Comments Off on HIPAA

The CyberVors

A Russian cyber gang over the past several months has breached over 420,000 web and FTP sites to pilfer over 1.2 billion credentials. They are known as the CyberVors (Vors is thief in Russian). They used botnets to scan hundreds … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on The CyberVors

The Internet of Things: Dr. John Barrett at TEDxCIT

Where are we now compared to two years ago? Dr. John Barrett talks about the Internet of Things.

Posted in Security Blog | Tagged , , , , | Comments Off on The Internet of Things: Dr. John Barrett at TEDxCIT

The BatCISO

Genius!! I love the saying… compliance gives organizations security it requires, not the security it needs.

Posted in Security Blog | Tagged | Comments Off on The BatCISO

More James Lyne, Anatomy of an Attack

I really like how passionate James Lyne is about his field. It was a presentation very similar to this that got me intrigued into the security field. It was a Cisco security conference in Tucson where the presenter hacked a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on More James Lyne, Anatomy of an Attack

Bad Contractors

Even more of a reason to have a solid Third Party Assessment program within your organization. Not one, or two, but three Israeli defense contractors who built the Iron Dome missile defense system were compromised by hackers. How were they … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Bad Contractors

80s Hacking

Too funny how Hollywood portrayed hacking in the 80s.

Posted in Security Blog | Tagged , , , | Comments Off on 80s Hacking

The Anti-Car-Hacking Gadget?

In December of 2013, US Senator Edward Markey sent a letter to car manufacturers in regards to securing vehicles against cyber-attacks. There is a $30 hacking kit that can be used to steal BMW cars and there is a $20 … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on The Anti-Car-Hacking Gadget?

This is Horribly Out of Tune

and awesome! Vijay Haripal created this horribly wonderful video. Very creative, right? No lie, I liked it.

Posted in Security Blog | Tagged , , | Comments Off on This is Horribly Out of Tune