Tag Archives: 2017

Data Privacy Day

Learn more about Data Privacy Day and lastly an official video

Posted in Security Blog | Tagged , , , , | Comments Off on Data Privacy Day

Along the Lines of Edward Snowden

President Trump put out a communications blackout and now many Federal agencies are leaking information to the press, just like something Edward Snowden would do. Or is it? Most of the resistance is coming from agencies with a focus on … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Along the Lines of Edward Snowden

Giuliani is The President’s Cybersecurity Advisor

Former Mayor Rudy Giuliani has been named the President’s Cybersecurity Advisor. There is a lot of public opinion from infosec and hacker communities alike since Rudy’s website, Giulianisecurity.com, had security vulnerabilities (and now no longer resolves). Giuliani introduced CompStat to the NYPD… … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Giuliani is The President’s Cybersecurity Advisor

President Trump Tech Talk On Cyber. A Supercut

I promise this site is apolitical (not interested or involved in politics) but since I’m about humor and cybersecurity. We have a new President and I know there will be Impact/Magnitude and Likelihood/Frequency of threats to vulnerabilities! That’s risk y’all! … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on President Trump Tech Talk On Cyber. A Supercut

Brilliant Video Showing The Anatomy of An Attack

Cisco made a great video (4 minutes) that I honestly think everyone must see. It breaks down a complex ransomware attack. Picture this happening to your organization. Are you ready for it?

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Brilliant Video Showing The Anatomy of An Attack

The NIST CyberSecurity Framework

According to Gartner, NIST says 30 percent of U.S. organizations used the framework in 2015, and it expects that percentage to grow to 50 percent by 2020.

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on The NIST CyberSecurity Framework

New Security Consulting Company Named ; DROP TABLE “COMPANIES”;– LTD

There is a new security consulting company that has the amazingly funny name ; DROP TABLE “COMPANIES”;– LTD Of course the first thing I think about is Exploits of a mom…

Posted in Security Blog | Tagged , , | Comments Off on New Security Consulting Company Named ; DROP TABLE “COMPANIES”;– LTD

Ransomware Decryption Key: Your Time Exchanged for Security Awareness

In an odd twist, the Koolova ransomware will decrypt for the low price of reading two articles on ransomware… The articles that Koolova wants you to read are an article from Google Security Blog called Stay safe while browsing and BleepingComputer’s Jigsaw Ransomware … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Ransomware Decryption Key: Your Time Exchanged for Security Awareness

Is the C.I.A. Triad Old and Busted?

Everyone knows that the CIA Triad stands for the Confidentiality, Integrity, and Availability of data, earlier in 2016 at a Gartner conference though, I ran across this. The CIAS model, which is improved to include the safety of people and … Continue reading

Posted in Security Blog | Tagged , | Comments Off on Is the C.I.A. Triad Old and Busted?