Tag Archives: 2014

Managing Your Company’s Cyber-Crime Risk

This video is what should be shared with company board of directors. It’s broken down so that a business leader can better grasp it. On another note, this is the type of video that should be understood so that it … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Managing Your Company’s Cyber-Crime Risk

Quadcopter with Machine Guns

A big goal of security is to safeguard human lives. What if wars of the future are thousands of these? What if they are autonomous? Worse, what if they are susceptible to skyjacking, as Samy Kamkar demonstrates here? The future … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Quadcopter with Machine Guns

What Can InfoSec Learn from Video Games?

Dwayne Melancon the Chief Technology Officer at Tripwire Adventure games make it easy for us to understand how our skills, weapons and countermeasures match up to the threats we expect to face. In this session, we’ll discuss models and lessons … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on What Can InfoSec Learn from Video Games?

Kali Linux on your Android Phone

Though I’ve yet to find the ARM packages to install BackTrack on a Kali Linux Chromebook, I did find this awesome tutorial on installing Kali Linux on Android. You may want to get a larger memory card prior to installing … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Kali Linux on your Android Phone

Information Security Awareness Crossword

Cute, found it online. Try it out!

Posted in Security Blog | Tagged , , , | Comments Off on Information Security Awareness Crossword

Digital Profile

Ubisoft created a video game called Watch Dogs, though some of the threats may be far reaching in their risk analysis, if you have a Facebook profile and are active on it, try out the Digital Shadow. I can appreciate … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Digital Profile

The Verizon 2014 Data Breach Investigations Report

For the whole 60 page report, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf. For the 8 page Executive Summary, you can find it here –> http://www.verizonenterprise.com/DBIR/2014/reports/rp_dbir-2014-executive-summary_en_xg.pdf There are seven common themes: Be vigilant. Organizations often only find out about security breaches when … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Verizon 2014 Data Breach Investigations Report

Not a CISSP? After Watching This, You’ll Want to be. Already One?

The C, I, double S, P

Posted in Security Blog | Tagged , , , | Comments Off on Not a CISSP? After Watching This, You’ll Want to be. Already One?

Dr. Steven Bagley: Heartbleed Code

In this video, which I found through links on Facebook, Dr. Steven Bagley runs the Heartbleed code to show exactly how the exploit works. Also, here is a website that may give you some audit capabilities. http://www.garage4hackers.com/blog.php?b=2551

Posted in Security Blog | Tagged , , , , | Comments Off on Dr. Steven Bagley: Heartbleed Code

KPMG on GRC

A somewhat vendor neutral animation on GRC to help make informed decisions.

Posted in Security Blog | Tagged , , , , , | Comments Off on KPMG on GRC