Tag Archives: security

Risk and Security Regional Community Forum

Wipro/Edgile/ServiceNow me out to Silicon Valley to have a discussion on my project associated with my Vulnerability Governance program and we ended up being the headliner! It was pretty cool and I got to hang out with a coworker and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Risk and Security Regional Community Forum

Choosing a Security Framework

I had a conversation about this topic the other day, so I was pretty happy to stumble upon this video.

Posted in Security Blog | Tagged , , , , | Comments Off on Choosing a Security Framework

Tech Support Scam Infographic

Here is a cool infographic that Microsoft created. I love infographics with numbers in them. 50% of Millennials are normally scammed. 34% are about my age. 17% are old… like my boss at work :)

Posted in Security Blog | Tagged , , , , , , , , , , , , , , | Comments Off on Tech Support Scam Infographic

Amendment to California Law on Breaches

On September 13, 2016, Governor Jerry Brown signed AB 2525, which amends the state’s data breach notification law (California S.B. 1386) requiring businesses to disclose data breaches to individuals whose personal information has been compromised. Currently, the law only requires … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Amendment to California Law on Breaches

Gartner Security and Risk Management Summit: Day 2

Keynote Speaker Colin Powell Biography link here

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Gartner Security and Risk Management Summit: Day 2

Gartner Security and Risk Management Summit: Day 1

We arrived into town (Alexandria VA) yesterday and I have been crazy busy since. I hadn’t realized how many friends and how much family I have on this side of the world! So with the already busy conference schedule, I … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Gartner Security and Risk Management Summit: Day 1

LinkedIn Breach Data Leaked

Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on LinkedIn Breach Data Leaked

Phishing Outlook Looks Legitimate

When an attacker is using Microsoft Office 365’s Outlook paired with Microsoft Lync, it makes phishing emails look authentic and harder to detect without really checking it out. See graphic below.

Posted in Security Blog | Tagged , , , , , | Comments Off on Phishing Outlook Looks Legitimate

Wireless Mice Leave Corporate Networks Vulnerable To Attack

Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack

USB Compromise Reveals 22,000 ISIS Identities

A man who names himself Abu Hamed has defected from ISIS and he plausibly stole a USB stick from ISIS security headquarters that contained recruiting questionnaires. The information in the questionnaires contained name, date and place of birth, hometown, telephone … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Compromise Reveals 22,000 ISIS Identities