Tag Archives: 2017

Just Accept the Risk

Lately, there is a lot of risk management in my life.

Posted in Security Blog | Tagged , , , , | Comments Off on Just Accept the Risk

Infographic on Cyber Insurance and How It Helps to Deal with a Breach

Posted in Security Blog | Tagged , , , , | Comments Off on Infographic on Cyber Insurance and How It Helps to Deal with a Breach

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

On Thursday, May 11, 2017, the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure was released. On a personal note, I like it! Here it is below, copied from https://www.whitehouse.gov/the-press-office/2017/05/11/presidential-executive-order-strengthening-cybersecurity-federal EXECUTIVE ORDER – – – – – … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Probably Makes You WannaCry

The WannaCry name belongs to the ransomware program that was launched this past Friday that has already infected close to 1/4 million Microsoft Windows systems across 150 countries, with an asking price of $300 in bitcoin to decrypt your files… … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Probably Makes You WannaCry

Risky? I Too Like to Live Dangerously

She said she was turned on by men who took risks . . .So he took the plastic off his iPhone screen. — 50 Nerds of Grey (@50NerdsofGrey) April 1, 2016

Posted in Security Blog | Tagged , , , | Comments Off on Risky? I Too Like to Live Dangerously

Today Show: Hacker Hijack

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Today Show: Hacker Hijack

CIA Hacking Tools

According to Wikileaks Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on CIA Hacking Tools

Hey, Will You Be My Valentine

Phishing Victim? Be on the lookout this week for phishing attacks that play on Valentine’s day. <eom>

Posted in Security Blog | Tagged , , , , | Comments Off on Hey, Will You Be My Valentine

Garfield and Friends on CyberSecurity

I know kids don’t visit my site, but adults do. Show this to your kids. Dr. Cybrina, CISSP teaches kids how to stay safe and secure online while Garfield tries to break his Jelly Donut record.

Posted in Security Blog | Tagged , , , , | Comments Off on Garfield and Friends on CyberSecurity

Pragmatic Cyber Risk Quantification

ISC2 presents Jack Jones, founder of FAIR. Quantitative risk analysis is achievable, can be pragmatic, and can actually out-perform qualitative risk analysis in the face of complex issues like intelligent adversaries. Join Jack Jones, the original author of the Factor … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Pragmatic Cyber Risk Quantification