Category Archives: Security Blog

New Security Consulting Company Named ; DROP TABLE “COMPANIES”;– LTD

There is a new security consulting company that has the amazingly funny name ; DROP TABLE “COMPANIES”;– LTD Of course the first thing I think about is Exploits of a mom…

Posted in Security Blog | Tagged , , | Comments Off on New Security Consulting Company Named ; DROP TABLE “COMPANIES”;– LTD

Ransomware Decryption Key: Your Time Exchanged for Security Awareness

In an odd twist, the Koolova ransomware will decrypt for the low price of reading two articles on ransomware… The articles that Koolova wants you to read are an article from Google Security Blog called Stay safe while browsing and BleepingComputer’s Jigsaw Ransomware … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Ransomware Decryption Key: Your Time Exchanged for Security Awareness

Is the C.I.A. Triad Old and Busted?

Everyone knows that the CIA Triad stands for the Confidentiality, Integrity, and Availability of data, earlier in 2016 at a Gartner conference though, I ran across this. The CIAS model, which is improved to include the safety of people and … Continue reading

Posted in Security Blog | Tagged , | Comments Off on Is the C.I.A. Triad Old and Busted?

Did Russia Hack the US Election?

The information security community is abuzz about the DHS/FBI Joint Analysis Report which was published on December 29th, 2016. The report investigates if Russia interfered with the U.S. election process through hacks on the Democratic National Committee, the Democratic Congressional Campaign … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Did Russia Hack the US Election?

Merry Christmas (Information Security Comics)

Some pictures I found on the Internet

Posted in Security Blog | Tagged , , | Comments Off on Merry Christmas (Information Security Comics)

2016 San Francisco CISO Executive Summit

I had the privilege of attending the 2016 CISO Executive Summit in San Francisco on Monday the 5th. I went with a great group of people! There was a lot of good discussions regarding leadership, insider threats, third party management, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 2016 San Francisco CISO Executive Summit

President-Elect Trump on 100 Day Transition Plan

Trump’s plan includes asking the Department of Defense and the Chairman of the Joint Chiefs of Staff to create plan to protect our infrastructure against Cyber Attacks. How this will modify the Cybersecurity National Action Plan that was published under … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on President-Elect Trump on 100 Day Transition Plan

Real Trojan Horse

I’ve been working several Physical Security projects lately and I’m really surprised that I didn’t try this. (The fun starts at 36 seconds into the video) I’m not surprised at this hack’s success rate.

Posted in Security Blog | Tagged , | Comments Off on Real Trojan Horse

Veterans Day

I am humbled to have served with my brothers and sisters. This day is the anniversary of the signing of the armistice, which ended the World War I hostilities between the Allied nations and Germany in 1918. Thank you to … Continue reading

Posted in Security Blog | Tagged | Comments Off on Veterans Day

Million Mask March and Possible Cyber Attacks

There is a planned million mask march (in Guy Fawkes masks) today. It is possible individuals claiming affiliation with the anonymous hacktivist group will take the opportunity to conduct their own operations. The FBI assesses it is possible unaffiliated hackers … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Million Mask March and Possible Cyber Attacks