Tag Archives: 2014

Some CISSP Webcasts

Some CISSP Webcasts that I reviewed last year prior to my test, which I passed in January of 2014. Access Control  Telecommunications and Network Security  Information Security Governance and Risk Management  Application Development Security  Cryptography  Security Architecture and Design  Operations … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on Some CISSP Webcasts

OWASP Top 10 Training for CPEs

ISC2 had a link on their website for some motivating, not boring, well maybe a little, OWASP Top 10 training CBTs, provided by Security Compass. If you are doing security code reviews this helps a little, or at least can … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on OWASP Top 10 Training for CPEs

Hacking Cars

A news bit about car hacking And Dr. Charlie Miller @0xcharlie presents how he has done this Car_Hacking_Hacktivity_2013_whitepaper What’s next? Well, eventually, there will be Google car hacking, I’m sure of it. Update 20140723. The good Dr. Charlie Miller will … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Hacking Cars

Smart TV Hacking

@beist from Korea. TVs are never really off, are they? Here are his slides (pdf).

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Smart TV Hacking

User Based (Health) Insurance?

I almost wanted a fitbit. I started to see a lot of them at work and in general. They seemed to grow in popularity like Crocs did 10 years ago. I decided to wait it out and watch people wear … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on User Based (Health) Insurance?

Google’s Driverless Car

Kawaii!! Here are some questions to ask though. What will become of the insurance industry if driverless cars become the norm? Will it still be mandatory in the US to have car insurance? What if someone hacks a car and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Google’s Driverless Car

It’s Compliance Week: COSO

Technically, compliance week 2014 started yesterday. What is compliance week? Well, It’s a gathering from Compliance Week Magazine that puts together a 3-day networking event. You can be reached out to by event sponsors, you can chat with senior-level compliance … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on It’s Compliance Week: COSO

The Ponemon Institute’s Data Breach Study

In my opinion, the Ponemon Institute’s Cost of Data Breach Study is eye-opening. If you use a GRC tool that associates dollar amount loss per record, you should probably read this report and make the necessary changes. Increasing the cost … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Ponemon Institute’s Data Breach Study

Intel: 4238 Years to Crack My Password

According to this website that Intel has created: https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html, it would take about 4238 years to crack my password. Which does make me wonder, it being Intel, that they are taking into account Moore’s law, which is the number of … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Intel: 4238 Years to Crack My Password

Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars

I tweeted this earlier today but didn’t have the chance to post the video. It immediately made me think of the 1995 movie, Hackers, with Jonny Lee Miller (aka Crash Override or Zero Cool) and Angelina Jolie. Ah, those were … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars