Category Archives: Security Blog

Infographic on Cyber Insurance and How It Helps to Deal with a Breach

Posted in Security Blog | Tagged , , , , | Comments Off on Infographic on Cyber Insurance and How It Helps to Deal with a Breach

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

On Thursday, May 11, 2017, the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure was released. On a personal note, I like it! Here it is below, copied from https://www.whitehouse.gov/the-press-office/2017/05/11/presidential-executive-order-strengthening-cybersecurity-federal EXECUTIVE ORDER – – – – – … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Probably Makes You WannaCry

The WannaCry name belongs to the ransomware program that was launched this past Friday that has already infected close to 1/4 million Microsoft Windows systems across 150 countries, with an asking price of $300 in bitcoin to decrypt your files… … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Probably Makes You WannaCry

Risky? I Too Like to Live Dangerously

She said she was turned on by men who took risks . . .So he took the plastic off his iPhone screen. — 50 Nerds of Grey (@50NerdsofGrey) April 1, 2016

Posted in Security Blog | Tagged , , , | Comments Off on Risky? I Too Like to Live Dangerously

Today Show: Hacker Hijack

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Today Show: Hacker Hijack

When Less Is More

I had a slightly engaging discussion regarding the scoring of impact, with human life being one of the factors. (Think a negative event with the factors being reputation, financial, property, human life as part of the equation) What value do … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on When Less Is More

CIA Hacking Tools

According to Wikileaks Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on CIA Hacking Tools

Hey, Will You Be My Valentine

Phishing Victim? Be on the lookout this week for phishing attacks that play on Valentine’s day. <eom>

Posted in Security Blog | Tagged , , , , | Comments Off on Hey, Will You Be My Valentine

What is GRC?

Governance, Risk, and Compliance. A nice infographic.

Posted in Security Blog | Tagged , , , , | Comments Off on What is GRC?

Garfield and Friends on CyberSecurity

I know kids don’t visit my site, but adults do. Show this to your kids. Dr. Cybrina, CISSP teaches kids how to stay safe and secure online while Garfield tries to break his Jelly Donut record.

Posted in Security Blog | Tagged , , , , | Comments Off on Garfield and Friends on CyberSecurity