Tag Archives: cyber risk

Updates to OpenFAIR

There’s an update to OpenFAIR and here’s the video on it. The update includes adding the NIST CSF 5 Functions around the 15 minute mark.

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Updates to OpenFAIR

Pragmatic Cyber Risk Quantification

ISC2 presents Jack Jones, founder of FAIR. Quantitative risk analysis is achievable, can be pragmatic, and can actually out-perform qualitative risk analysis in the face of complex issues like intelligent adversaries. Join Jack Jones, the original author of the Factor … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Pragmatic Cyber Risk Quantification

George Costanza from Seinfeld on Risk Management

An amusing clip on George Costanza becoming a mentor on Risk Management

Posted in Security Blog | Tagged , , , , , , , | Comments Off on George Costanza from Seinfeld on Risk Management

Dyn Down by DDoS

Dyn a company that provides dynamic domain name resolution (convert names into IP addresses) was threatened to shell out some bitcoin or else… Or else what? I’d like to call it an availability compromise, but in layman’s terms, an outage … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Dyn Down by DDoS

The Largest Distributed Denial of Service, EVER! (A Robot Knock-Knock Description)

Denial of Service explained: Computers respond to network traffic, generally. If there was a computer on my network that wanted to talk to my computer, that computer would put out a request to talk to my computer over the network, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on The Largest Distributed Denial of Service, EVER! (A Robot Knock-Knock Description)

Confessions of a Cyber Spy Hunter

With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Confessions of a Cyber Spy Hunter

Top 5 CyberThreats of 2016 To Attack or Defend Against

Depending on what color hat you wear, here are the top cyberthreats that most companies face, according to research. 5. Cross Site Scripting or XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Top 5 CyberThreats of 2016 To Attack or Defend Against

Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Don’t be a Billy: NCSAM

A fun, old-ish video on Cyber security.

Posted in Security Blog | Tagged , , | Comments Off on Don’t be a Billy: NCSAM

Happy Two-Factor Tuesday!!!

Check out some of my awesome posts on enabling Two-Factor What is Two-Factor? It’s something you know… like a password… and something you have, like an token generator or smartphone! That doesn’t mean have an easy to guess password though! You … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Happy Two-Factor Tuesday!!!