January 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,946 hits
Tag Archives: 2014
Managing Your Company’s Cyber-Crime Risk
This video is what should be shared with company board of directors. It’s broken down so that a business leader can better grasp it. On another note, this is the type of video that should be understood so that it … Continue reading
Posted in Security Blog
Tagged 2014, boardmember, compliance, corporate boardmember, cyber-security problems, cybercrime, kroll, risk management, vulnerability assessment
Comments Off on Managing Your Company’s Cyber-Crime Risk
Quadcopter with Machine Guns
A big goal of security is to safeguard human lives. What if wars of the future are thousands of these? What if they are autonomous? Worse, what if they are susceptible to skyjacking, as Samy Kamkar demonstrates here? The future … Continue reading
Posted in Security Blog
Tagged 2014, autonomous, cyber war, drone, drones, hacked, quadcopter, samy kamkar
Comments Off on Quadcopter with Machine Guns
What Can InfoSec Learn from Video Games?
Dwayne Melancon the Chief Technology Officer at Tripwire Adventure games make it easy for us to understand how our skills, weapons and countermeasures match up to the threats we expect to face. In this session, we’ll discuss models and lessons … Continue reading
Posted in Security Blog
Tagged 2014, diablo, information security, video games
Comments Off on What Can InfoSec Learn from Video Games?
Kali Linux on your Android Phone
Though I’ve yet to find the ARM packages to install BackTrack on a Kali Linux Chromebook, I did find this awesome tutorial on installing Kali Linux on Android. You may want to get a larger memory card prior to installing … Continue reading
Posted in Security Blog
Tagged 2014, android, backtrack, chromebook, kali
Comments Off on Kali Linux on your Android Phone
Information Security Awareness Crossword
Cute, found it online. Try it out!
Posted in Security Blog
Tagged 2014, crossword, Information Technology Security Awareness, puzzle
Comments Off on Information Security Awareness Crossword
Digital Profile
Ubisoft created a video game called Watch Dogs, though some of the threats may be far reaching in their risk analysis, if you have a Facebook profile and are active on it, try out the Digital Shadow. I can appreciate … Continue reading
Posted in Security Blog
Tagged 2014, digital profile, digital shadow, privacy, risk management, ubisoft, video game, watchdogs
Comments Off on Digital Profile
The Verizon 2014 Data Breach Investigations Report
For the whole 60 page report, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf. For the 8 page Executive Summary, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_dbir-2014-executive-summary_en_xg.pdf There are seven common themes: Be vigilant. Organizations often only find out about security breaches when … Continue reading
Posted in Security Blog
Tagged 2014, data breaches, investigations, report, verizon
Comments Off on The Verizon 2014 Data Breach Investigations Report
Not a CISSP? After Watching This, You’ll Want to be. Already One?
The C, I, double S, P
Posted in Security Blog
Tagged 2014, CISSP, Information Technology Security Awareness, lol
Comments Off on Not a CISSP? After Watching This, You’ll Want to be. Already One?
Dr. Steven Bagley: Heartbleed Code
In this video, which I found through links on Facebook, Dr. Steven Bagley runs the Heartbleed code to show exactly how the exploit works. Also, here is a website that may give you some audit capabilities. http://www.garage4hackers.com/blog.php?b=2551
Posted in Security Blog
Tagged @computer_phile, 2014, Dr. Steven Bagley, Heartbleed, openssl
Comments Off on Dr. Steven Bagley: Heartbleed Code
KPMG on GRC
A somewhat vendor neutral animation on GRC to help make informed decisions.
Posted in Security Blog
Tagged 2014, compliance, governance, grc, kpmg, risk
Comments Off on KPMG on GRC