Tag Archives: ted

Virtual Work Happy Hour

We haven’t had one of these since Eric left and I was glad to be able to have taken a screenshot this time. I can’t believe we ended up talking about studying AWS… Nerds!

Posted in life | Tagged , , , , | Comments Off on Virtual Work Happy Hour

Confessions of a Cyber Spy Hunter

With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Confessions of a Cyber Spy Hunter

Social Engineering – How to Scam Your Way into Anything

A great video by Brian Brushwood, from Scam School, on Social Engineering. The video quotes the following books:

Posted in Security Blog | Tagged , , , , , | Comments Off on Social Engineering – How to Scam Your Way into Anything

The Internet of Things: Dr. John Barrett at TEDxCIT

Where are we now compared to two years ago? Dr. John Barrett talks about the Internet of Things.

Posted in Security Blog | Tagged , , , , | Comments Off on The Internet of Things: Dr. John Barrett at TEDxCIT

Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

Ted Talks: Chris Domas: The 1s and 0s behind cyber warfare

Chris Domas is a cybersecurity researcher, operating on what’s become a new front of war, “cyber.” In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Ted Talks: Chris Domas: The 1s and 0s behind cyber warfare

Keren Elazari: Hackers: the Internet’s immune system

Keren gives a great talk about the Internet.

Posted in Security Blog | Tagged , , , | Comments Off on Keren Elazari: Hackers: the Internet’s immune system

Gary Warner on TedxBirmingham: Why do we call it CyberCrime?

What is cybercrime? How do we fight cybercrime? Who do we report cybercrime to? Gary Warner tells us his thoughts.

Posted in Security Blog | Tagged , , , , , | Comments Off on Gary Warner on TedxBirmingham: Why do we call it CyberCrime?

Edward Snowden on Ted: Here’s How to Take Back the Internet

Makes you think differently about this bottle top. Read it from the perspective of the normal person, read it from the perspective of Edward Snowden, then read it from the perspective of the NSA.

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Edward Snowden on Ted: Here’s How to Take Back the Internet

Bruce Schneier: The Security Mirage

My CISO brought this up today, so I’m posting it to watch it.

Posted in Security Blog | Tagged , , , , , , | Comments Off on Bruce Schneier: The Security Mirage