Tag Archives: information security

Let the Data Tell Your Story

Big data doesn’t necessarily mean good data. This presentation, created Aug 25 2015, makes us realize that bad guys have the good data and it enables them to keep attacking successfully. (It’s a 47 minutes presentation)

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Let the Data Tell Your Story

Five Habits to be Unhackable

By simply adopting these five habits of practically unhackable people, you too can have better security. Think before you click. 95% of hacks are the result of clicking bad links, so make sure to check that it’s the right URL and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Five Habits to be Unhackable

Breaches, Attacks, and Vulnerabilities in October 2014

This might be the longest one I’ve done so far: List of data breaches and cyber attacks in October http://t.co/AtYQ3vBJEa — Lewis Morgan (@LewisMorgan_) October 28, 2014 Payment information breach Dairy Queen Data breach hits 395 stores ‘Big K’ raided … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Breaches, Attacks, and Vulnerabilities in October 2014

Seven Million Dropbox Passwords

6,937,081 usernames and passwords were unfortunately stolen from other services and used in attempts to log in to Dropbox accounts. I recommend that users turn on two-factor authentication and install a time-based, one-time password app on a mobile device. To … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Seven Million Dropbox Passwords

NOVA Labs – Cybersecurity Lab

I stumbled upon a little jewel yesterday when I found PBS Presents: The Secret Lives of Hackers. The video is nicely done, but what’s more is the website that the video was originally posted on. PBS, the Public Broadcasting Service, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on NOVA Labs – Cybersecurity Lab

Interactive VCDB

If you are new to the VCDB (Vocabulary for Event Recording and Incident Sharing Community Database), you are in for a treat. It’s a nice interface to gather information on incidents.

Posted in Security Blog | Tagged , , , | Comments Off on Interactive VCDB

Encrypting Your Android Phone

I’ve been a huge fan of Android based phones. New Android phones will be encrypted by default, but if you have had your smart phone for over a month, you probably do not have encryption enabled. Why would you want … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Encrypting Your Android Phone

Cyber Risk & Internet of Things

I made this video for work, but modified it a bit so it’s not directly work related, but I didn’t edit the audio… Don’t hate! It’s my first one. The intended audience is for those who don’t think with a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , | Comments Off on Cyber Risk & Internet of Things

Should We Buy Credit Monitoring Services?

With the ton of breaches that have been happening, we use one of the credit monitoring services, after this year though and all the breaches going on, one of the first services that is offered to potential victims, is credit … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Should We Buy Credit Monitoring Services?

What Can InfoSec Learn from Video Games?

Dwayne Melancon the Chief Technology Officer at Tripwire Adventure games make it easy for us to understand how our skills, weapons and countermeasures match up to the threats we expect to face. In this session, we’ll discuss models and lessons … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on What Can InfoSec Learn from Video Games?