Blog Stats
- 77,768 hits
Category Archives: Security Blog
Infographic on Cyber Insurance and How It Helps to Deal with a Breach
Posted in Security Blog
Tagged 2017, breach, cyber, infographic, insurance
Comments Off on Infographic on Cyber Insurance and How It Helps to Deal with a Breach
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
On Thursday, May 11, 2017, the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure was released. On a personal note, I like it! Here it is below, copied from https://www.whitehouse.gov/the-press-office/2017/05/11/presidential-executive-order-strengthening-cybersecurity-federal EXECUTIVE ORDER – – – – – … Continue reading
Posted in Security Blog
Tagged 2017, cybersecurity, Executive Order, framework, Improving Critical Infrastructure Cybersecurity, President, risk management, Trump
Comments Off on Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Probably Makes You WannaCry
The WannaCry name belongs to the ransomware program that was launched this past Friday that has already infected close to 1/4 million Microsoft Windows systems across 150 countries, with an asking price of $300 in bitcoin to decrypt your files… … Continue reading
Posted in Security Blog
Tagged 2017, malware, ransomware, wannacry
Comments Off on Probably Makes You WannaCry
Risky? I Too Like to Live Dangerously
She said she was turned on by men who took risks . . .So he took the plastic off his iPhone screen. — 50 Nerds of Grey (@50NerdsofGrey) April 1, 2016
Posted in Security Blog
Tagged 2016, 2017, risk, risk management
Comments Off on Risky? I Too Like to Live Dangerously
Today Show: Hacker Hijack
Posted in Security Blog
Tagged 2017, computer security, hacked, hacking, James Lyne, malware, phishing, ransomware, spear phishing, spearphishing
Comments Off on Today Show: Hacker Hijack
When Less Is More
I had a slightly engaging discussion regarding the scoring of impact, with human life being one of the factors. (Think a negative event with the factors being reputation, financial, property, human life as part of the equation) What value do … Continue reading
Posted in Security Blog
Tagged risk, risk analysis, risk management
Comments Off on When Less Is More
CIA Hacking Tools
According to Wikileaks Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred … Continue reading
Hey, Will You Be My Valentine
Phishing Victim? Be on the lookout this week for phishing attacks that play on Valentine’s day. <eom>
Posted in Security Blog
Tagged 2017, phishing, Security Awareness, social engineering, Valentine's Day
Comments Off on Hey, Will You Be My Valentine
What is GRC?
Governance, Risk, and Compliance. A nice infographic.
Posted in Security Blog
Tagged compliance, governance, grc, infographic, risk
Comments Off on What is GRC?
Garfield and Friends on CyberSecurity
I know kids don’t visit my site, but adults do. Show this to your kids. Dr. Cybrina, CISSP teaches kids how to stay safe and secure online while Garfield tries to break his Jelly Donut record.
Posted in Security Blog
Tagged 2017, kids, privacy, Safe and Secure Online, Security Awareness
Comments Off on Garfield and Friends on CyberSecurity