December 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,693 hits
Tag Archives: security
Risk and Security Regional Community Forum
Wipro/Edgile/ServiceNow me out to Silicon Valley to have a discussion on my project associated with my Vulnerability Governance program and we ended up being the headliner! It was pretty cool and I got to hang out with a coworker and … Continue reading
Posted in Security Blog
Tagged 2023, Carmelo, cybersecurity, Edgile, information security, risk, Risk and Security Regional Community Forum, security, ServiceNow, Vulnerability Governance, Wipro
Comments Off on Risk and Security Regional Community Forum
Choosing a Security Framework
I had a conversation about this topic the other day, so I was pretty happy to stumble upon this video.
Posted in Security Blog
Tagged CyberSecurity Framework, framework, iso27002, NIST 800-53, security
Comments Off on Choosing a Security Framework
Tech Support Scam Infographic
Here is a cool infographic that Microsoft created. I love infographics with numbers in them. 50% of Millennials are normally scammed. 34% are about my age. 17% are old… like my boss at work :)
Posted in Security Blog
Tagged 2016, fraud, hackers, hacking, infographic, information security, phishing, privacy, scam, scammers, scamming, security, social engineering, spear phishing, spearphishing
Comments Off on Tech Support Scam Infographic
Amendment to California Law on Breaches
On September 13, 2016, Governor Jerry Brown signed AB 2525, which amends the state’s data breach notification law (California S.B. 1386) requiring businesses to disclose data breaches to individuals whose personal information has been compromised. Currently, the law only requires … Continue reading
Posted in Security Blog
Tagged 2016, 2017, breach, California, law, Notification, SB1386, security
Comments Off on Amendment to California Law on Breaches
Gartner Security and Risk Management Summit: Day 2
Keynote Speaker Colin Powell Biography link here
Posted in Security Blog
Tagged #gartnersec, 2016, Gartner, risk, risk analysis, risk management, security, Security Awareness
Comments Off on Gartner Security and Risk Management Summit: Day 2
Gartner Security and Risk Management Summit: Day 1
We arrived into town (Alexandria VA) yesterday and I have been crazy busy since. I hadn’t realized how many friends and how much family I have on this side of the world! So with the already busy conference schedule, I … Continue reading
Posted in Security Blog
Tagged #gartnersec, 2016, Gartner, risk, risk analysis, risk management, security, Security Awareness
Comments Off on Gartner Security and Risk Management Summit: Day 1
LinkedIn Breach Data Leaked
Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading
Posted in Security Blog
Tagged 2 factor, 2-step, 2012, 2016, 2fa, cybercrime, hacked, hackers, information security, linkedin, passwords, security, Security Awareness, two-factor
Comments Off on LinkedIn Breach Data Leaked
Phishing Outlook Looks Legitimate
When an attacker is using Microsoft Office 365’s Outlook paired with Microsoft Lync, it makes phishing emails look authentic and harder to detect without really checking it out. See graphic below.
Posted in Security Blog
Tagged 2016, FBI, phishing, security, Security Awareness, spearphishing
Comments Off on Phishing Outlook Looks Legitimate
Wireless Mice Leave Corporate Networks Vulnerable To Attack
Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading
Posted in Security Blog
Tagged 2016, bastille, bluetooth, hacking, information security, Information Technology Security Awareness, keyboard, mouse, reuters, security, wireless
Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack
USB Compromise Reveals 22,000 ISIS Identities
A man who names himself Abu Hamed has defected from ISIS and he plausibly stole a USB stick from ISIS security headquarters that contained recruiting questionnaires. The information in the questionnaires contained name, date and place of birth, hometown, telephone … Continue reading
Posted in Security Blog
Tagged 2016, Data Loss Prevention, DLP, information security, isis, privacy, security, Security Awareness, usb
Comments Off on USB Compromise Reveals 22,000 ISIS Identities