Complementing a Security Management Model with the 20 Critical Security Controls

Complementing a Security Management Model with the 20 Critical Security Controls

Complementing a Security Management Model with the 20 Critical Security Controls
Dec 23, 2014 | 1 comment | View Post
Former Anonymous hacker doubts North Korea behind Sony attack

Former Anonymous hacker doubts North Korea behind Sony attack

Former Anonymous hacker doubts North Korea behind Sony attack
Dec 21, 2014 | 0 comments | View Post
The U.S. Military Classification Scheme

The U.S. Military Classification Scheme

The U.S. military classification scheme relies on a more complex five-level classification scheme as defined in Executive Order 12958. This posting will list the classifications
Dec 20, 2014 | 0 comments | View Post
The Four Basic Strategies to Controlling Risks

The Four Basic Strategies to Controlling Risks

An organization must choose four basic strategies to control risks such as risk avoidance, risk transference, risk mitigation and risk acceptance. Below these for basic
Dec 20, 2014 | 0 comments | View Post
IC3 Warns of Cyber Attacks Focused on Law Enforcement and Public Officials

IC3 Warns of Cyber Attacks Focused on Law Enforcement and Public Officials

IC3 Warns of Cyber Attacks Focused on Law Enforcement and Public Officials

Adobe Releases Security Updates for Flash Player, ColdFusion, and Flex

Adobe Releases Security Updates for Flash Player, ColdFusion, and Flex

Adobe Releases Security Updates for Flash Player, ColdFusion, and Flex

Apple Releases Security Updates for Safari Browser

Apple Releases Security Updates for Safari Browser

Original release date: March 18, 2015
Apple has released security updates for Safari to address multiple vulnerabilities. Exploitation of these vulnerabilities may allow a remote attacker to execute arbitrary code or prevent users from discerning a phishing attack on an affected system.
Updates include:
• Safari 8.0.4 for OS X Mountain Lion v10.8.5
• Safari 7.1.4 for OS X Mavericks v10.9.5
• Safari 6.2.4 for OS X Yosemite v10.10.2
US-CERT encourages users and administrators to review Apple security update HT204560 and apply the necessary updates.

Banks to blame for fraudsters taking advantage of Apple Pay?

Banks to blame for fraudsters taking advantage of Apple Pay?

Banks to blame for fraudsters taking advantage of Apple Pay?

Intuit’s effort to stop tax fraud under scrutiny

Intuit’s effort to stop tax fraud under scrutiny

Intuit’s effort to stop tax fraud under scrutiny

CSI Cyber Recap

CSI: Cyber Season 1 Episode 1 Recap: Kidnapping 2.0

The episode starts off in Baltimore Maryland at 1:37 am when a couple is awakened from voices coming out of a baby-cam monitor that was apparently hacked and the infant (Caleb Reynolds) kidnapped.

A List of National Computer Security Incident Response Teams

A List of National Computer Security Incident Response Teams

National Computer Security Incident Response Teams

My Security Thoughts – Autonomous Vehicles by @mhbjr

My Security Thoughts – Autonomous Vehicles by @mhbjr

I will still look at the security implications of technology or service but am going to examine the other affects both positive and negative that these things will have on society as a whole

My Security Thoughts – The Smart Grid & The Danger to You by @mhbjr

My Security Thoughts – The Smart Grid & The Danger to You by @mhbjr

The utility industry needs to gather and act on information about me? The hairs on the back of my next are starting to raise but let’s keeps riding this train.

CompTIA Security+ SY0-401 vs. SY0-301 Changes by @InfosecEdu

CompTIA Security+ SY0-401 vs. SY0-301 Changes by @InfosecEdu

A new version of the popular CompTIA Security+ certification is out, and the content it covers has expanded significantly over the past three years.

Lenovo “Superfish” Adware Vulnerable to HTTPS Spoofing

Lenovo “Superfish” Adware Vulnerable to HTTPS Spoofing

Lenovo “Superfish” Adware Vulnerable to HTTPS Spoofing

President Obama at the Cybersecurity Summit

President Obama at the Cybersecurity Summit

President Obama at the Cybersecurity Summit

White House Summit on Cybersecurity and Consumer Protection [Live Stream]

White House Summit on Cybersecurity and Consumer Protection [Live Stream]

White House Summit on Cybersecurity and Consumer Protection [Live Stream]

Phishing email scam targets Anthem customers affected by recent cyberattack

Phishing email scam targets Anthem customers affected by recent cyberattack

Phishing email scam targets Anthem customers affected by recent cyberattack

Read more: http://www.wfsb.com/story/28044772/phishing-email-scam-targets-anthem-customers-affected-by-recent-cyberattack

Anthem Breach Prompts New York To Conduct Cybersecurity Reviews Of All Insurers

Anthem Breach Prompts New York To Conduct Cybersecurity Reviews Of All Insurers

Anthem Breach Prompts New York To Conduct Cybersecurity Reviews Of All Insurers

My Security Thoughts – My Digital Self

My Security Thoughts – My Digital Self

I start to wonder how often my digital self moves around this blue rock. Then I start to think about where digital me has rested or how many copies of digital me there are in the ether.

Cybersecurity Expert David Kennedy of TrustedSec to Speak at ISSA-LA Seventh Annual Information Security Summit on Cybercrime Solutions - June 4

Cybersecurity Expert David Kennedy of TrustedSec to Speak at ISSA-LA Seventh Annual Information Security Summit on Cybercrime Solutions – June 4

Cybersecurity Expert David Kennedy of TrustedSec to Speak at ISSA-LA Seventh Annual Information Security Summit on Cybercrime Solutions – June 4

Stanford Hosting White House Cybersecurity Summit

Stanford Hosting White House Cybersecurity Summit

Stanford Hosting White House Cybersecurity Summit

Certified Penetration Testing Engineer aka CPTE [Video]

Certified Penetration Testing Engineer aka CPTE [Video]

Certified Penetration Testing Engineer Mile2 CPTE Certificate

Happy Data Privacy Day!!!

Happy Data Privacy Day!!!

Data Privacy Day is observed every year on January 28 and is led by the National Cyber Security Alliance (NCSA), a nonprofit, public-private partnership dedicated cybersecurity education and awareness.

Introducing SHIPS – Centralized Local Password Management for Windows

Introducing SHIPS – Centralized Local Password Management for Windows

The Shared Host Integrated Password System (SHIPS) is an open-source solution created by Geoff Walton from TrustedSec

Transcript of President Barack Obama's State of the Union speech

Transcript of President Barack Obama’s State of the Union speech

Transcript of President Barack Obama’s State of the Union

President Obama Delivers the State of the Union Address 2015

President Obama Delivers the State of the Union Address 2015

President Obama Delivers the State of the Union Address 2015

President Obama's Pre-State of the Union Cybersecurity Talking Points

President Obama’s Pre-State of the Union Cybersecurity Talking Points

President Obama’s State of the Union Cybersecurity Talking Points

SQL Injection Vulnerability in miniBB

SQL Injection Vulnerability in miniBB

SQL Injection Vulnerability in miniBB

Page 1 of 3412345...102030...Last »