January 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,947 hits
Tag Archives: 2014
What’s New with PCI DSS 3.0
Posted in Security Blog
Tagged 2014, compliance, infographic, PCI Compliance
Comments Off on What’s New with PCI DSS 3.0
Top 20 Critical Security Controls
You know, I really dig SANS for putting things together. On their page called Critical Security Controls for Effective Cyber Defense, they list the top 20 critical security controls. I’m actually amazed at how quite a few companies do not … Continue reading
Posted in Security Blog
Tagged 2014, critical security controls, diagram, implementation, maintenance, sans, top 20
Comments Off on Top 20 Critical Security Controls
AAA: Getting Roadside Assistance from Tripwire
There is this webcast tomorrow. Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey: beginning with a small implementation of Tripwire, then running into roadblocks by Management for the expansion of products, and eventually … Continue reading
Posted in Security Blog
Tagged 2014, compliance, PCI Compliance, tripwire, webcast
Comments Off on AAA: Getting Roadside Assistance from Tripwire
Yesterday’s SEC Cybersecurity Roundtable
The Securities and Exchange Commission host a cybersecurity roundtable. Roundtable panelists will discuss the cybersecurity landscape and cybersecurity issues faced by exchanges and other key market systems, broker-dealers, investment advisers, transfer agents, and public companies. Panelists also will be invited … Continue reading
Posted in Security Blog
Tagged 2014, cybercrime, Cybersecurity Roundtable, discussions, Government, roundtable, sec, securities and exchange commission
Comments Off on Yesterday’s SEC Cybersecurity Roundtable
Dark Reading
Are you a cyber-security professional? Then you probably already know this about The New Dark Reading Information Security Community. If not… Consider yourself informed. You’re welcome!
Posted in Security Blog
Tagged 2014, compliance, cyber-security problems, Dark Reading, hackers, risk management, security professionals
Comments Off on Dark Reading
Hacker Drones Stealing your Info
Yet another video on attaching some hacking equipment to a drone. The mobile Internet devices such as phones, tablets, and laptops will always be in need of protection and honestly, the inventors can only do so much. Companies require administrative … Continue reading
Posted in Security Blog
Tagged 2014, drone, drones, hacking, phishing, pineapple, quadcopter, sniffing, spoofing
Comments Off on Hacker Drones Stealing your Info
The Cloud Ate My Homework
Years ago, while in college, we sometimes had a great excuse that the files on our floppy disk were corrupted somehow on days that we had to turn in our papers or to give a presentation.
Sell it to the NSA
Give it away for free. Profit!!