Tag Archives: 2016

Risky? I Too Like to Live Dangerously

She said she was turned on by men who took risks . . .So he took the plastic off his iPhone screen. — 50 Nerds of Grey (@50NerdsofGrey) April 1, 2016

Posted in Security Blog | Tagged , , , | Comments Off on Risky? I Too Like to Live Dangerously

Pragmatic Cyber Risk Quantification

ISC2 presents Jack Jones, founder of FAIR. Quantitative risk analysis is achievable, can be pragmatic, and can actually out-perform qualitative risk analysis in the face of complex issues like intelligent adversaries. Join Jack Jones, the original author of the Factor … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Pragmatic Cyber Risk Quantification

ID Theft Breach Report in 2016 – 3 Breaches a Day

The Identity Theft Resource Center creates an Annual Data Breach Report and the results are fascinating! There has been 1,093 breaches in 2016, that’s about 3 a day. It should be noted that data breaches are not all alike. Security … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on ID Theft Breach Report in 2016 – 3 Breaches a Day

Did Russia Hack the US Election?

The information security community is abuzz about the DHS/FBI Joint Analysis Report which was published on December 29th, 2016. The report investigates if Russia interfered with the U.S. election process through hacks on the Democratic National Committee, the Democratic Congressional Campaign … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Did Russia Hack the US Election?

Merry Christmas (Information Security Comics)

Some pictures I found on the Internet

Posted in Security Blog | Tagged , , | Comments Off on Merry Christmas (Information Security Comics)

2016 San Francisco CISO Executive Summit

I had the privilege of attending the 2016 CISO Executive Summit in San Francisco on Monday the 5th. I went with a great group of people! There was a lot of good discussions regarding leadership, insider threats, third party management, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 2016 San Francisco CISO Executive Summit

Million Mask March and Possible Cyber Attacks

There is a planned million mask march (in Guy Fawkes masks) today. It is possible individuals claiming affiliation with the anonymous hacktivist group will take the opportunity to conduct their own operations. The FBI assesses it is possible unaffiliated hackers … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Million Mask March and Possible Cyber Attacks

Dyn Down by DDoS

Dyn a company that provides dynamic domain name resolution (convert names into IP addresses) was threatened to shell out some bitcoin or else… Or else what? I’d like to call it an availability compromise, but in layman’s terms, an outage … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Dyn Down by DDoS

Tech Support Scam Infographic

Here is a cool infographic that Microsoft created. I love infographics with numbers in them. 50% of Millennials are normally scammed. 34% are about my age. 17% are old… like my boss at work :)

Posted in Security Blog | Tagged , , , , , , , , , , , , , , | Comments Off on Tech Support Scam Infographic

Ransomware and the IoT

During a security conference, a gentleman demonstrated a thermostat that he compromised, lock out the user for a ransom. He was even able to make the thermostat emit a tone only animals can hear. Imagine your dogs or cats freaking … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Ransomware and the IoT