Tag Archives: 2014

What’s New with PCI DSS 3.0

Posted in Security Blog | Tagged , , , | Comments Off on What’s New with PCI DSS 3.0

Top 20 Critical Security Controls

You know, I really dig SANS for putting things together. On their page called Critical Security Controls for Effective Cyber Defense, they list the top 20 critical security controls. I’m actually amazed at how quite a few companies do not … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Top 20 Critical Security Controls

AAA: Getting Roadside Assistance from Tripwire

There is this webcast tomorrow. Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey: beginning with a small implementation of Tripwire, then running into roadblocks by Management for the expansion of products, and eventually … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on AAA: Getting Roadside Assistance from Tripwire

An Oldie, but a Goodie: An Intro to Armitage

Rob Fuller, aka Mubix, created Armitage, a cool gui to work with Metasploit. Here is a demo on using this tool. At the time of this posting, the video is over 3 years old.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on An Oldie, but a Goodie: An Intro to Armitage

Yesterday’s SEC Cybersecurity Roundtable

The Securities and Exchange Commission host a cybersecurity roundtable. Roundtable panelists will discuss the cybersecurity landscape and cybersecurity issues faced by exchanges and other key market systems, broker-dealers, investment advisers, transfer agents, and public companies. Panelists also will be invited … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Yesterday’s SEC Cybersecurity Roundtable

Dark Reading

Are you a cyber-security professional? Then you probably already know this about The New Dark Reading Information Security Community. If not… Consider yourself informed. You’re welcome!

Posted in Security Blog | Tagged , , , , , , | Comments Off on Dark Reading

Hacker Drones Stealing your Info

Yet another video on attaching some hacking equipment to a drone. The mobile Internet devices such as phones, tablets, and laptops will always be in need of protection and honestly, the inventors can only do so much. Companies require administrative … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hacker Drones Stealing your Info

The Cloud Ate My Homework

Years ago, while in college, we sometimes had a great excuse that the files on our floppy disk were corrupted somehow on days that we had to turn in our papers or to give a presentation.

Posted in Security Blog | Tagged , | Comments Off on The Cloud Ate My Homework

Bart Simpson on Security Awareness

Posted in Security Blog | Tagged , , , | Comments Off on Bart Simpson on Security Awareness

Sell it to the NSA

Give it away for free. Profit!!

Posted in Security Blog | Tagged , , , | Comments Off on Sell it to the NSA