Tag Archives: framework

Choosing a Security Framework

I had a conversation about this topic the other day, so I was pretty happy to stumble upon this video.

Posted in Security Blog | Tagged , , , , | Comments Off on Choosing a Security Framework

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

On Thursday, May 11, 2017, the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure was released. On a personal note, I like it! Here it is below, copied from https://www.whitehouse.gov/the-press-office/2017/05/11/presidential-executive-order-strengthening-cybersecurity-federal EXECUTIVE ORDER – – – – – … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

President Trump Tech Talk On Cyber. A Supercut

I promise this site is apolitical (not interested or involved in politics) but since I’m about humor and cybersecurity. We have a new President and I know there will be Impact/Magnitude and Likelihood/Frequency of threats to vulnerabilities! That’s risk y’all! … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on President Trump Tech Talk On Cyber. A Supercut

The NIST CyberSecurity Framework

According to Gartner, NIST says 30 percent of U.S. organizations used the framework in 2015, and it expects that percentage to grow to 50 percent by 2020.

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on The NIST CyberSecurity Framework

NSA Wants Access to Encrypted Data Too!

The director of the U.S. National Security Agency, Michael Rogers, wants access to encrypted data on computers and other devices. He’s working on developing a framework that will enhance investigations. This functionality should be enabled by software manufacturers, but hopefully … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on NSA Wants Access to Encrypted Data Too!

White House Summit on Cybersecurity and Consumer Protection

That’s not an Illuminati hand sign, it’s the CIA Triad! On February 12th, President Obama signed an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government. Rapid … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on White House Summit on Cybersecurity and Consumer Protection

US Army Releases Cyber-Forensic Dshell Code

Available here on github, The Army Research Labs has publicly released a tool to help with network forensic analysis.

Posted in Security Blog | Tagged , , , , , , | Comments Off on US Army Releases Cyber-Forensic Dshell Code