Rolling with the Breaches - my commentary on the Wikileaks asshole memo from one CISO to others. https://www.riskbasedsecurity.com/2018/04/rolling-with-the-breaches/
Because Goldilocks was stupid! https://threatmatrix.cylance.com/en_us/home/assumptions-the-deadliest-vulnerability.html
🎗️
#catalan spring is happening
Here's another quality secure programming lesson: https://www.veracode.com/blog/secure-development/what-you-dont-do-secure-programming
In case you have the answers, here's the security problems: https://threatmatrix.cylance.com/en_us/home/unsolvable-security-problems.html
We've never looked back at any point in history and said we were right to violently suppress the grievances of any people anywhere. We also know no peace has ever come from making a mistreated demographic desperate. Yet it's still happening today in #Catalonia So WTF?
That is an Ikea shelf hacked into a gokart. And more teens need this kind of resourcefulness. Hacker Highschool does that. Now, Hacker Highschool is doing its annual fund drive for sponsors! This is good stuff both for securing your future and your upping your marketing! More info here: http://hackerhighschool.org/sponsors.html
Hacker Highschool is doing its yearly fund drive for sponsors! This is good stuff both for your future and your marketing! http://hackerhighschool.org/sponsors.html
The next great security solution will not be something that will just drop from the blue but be the thing that has matured to the point where it’s safely no longer a security device but part of every device.
Advice Ruins Lives in Cybersecurity https://medium.com/@peteherzog/advice-ruins-lives-in-cybersecurity-86e882f37b4d
www.hackerhighschool.org
OSSTMM - learn more about it on Dec. 14th here:
The Open Source Security Testing Methodology Manual
What is it? Why is it? How do I use it? What's happening with it?
You have questions, we have answers.
Only a few spots left so sign-up, learn, and ask your own questions.
https://www.brighttalk.com/webcast/14987/293029
The Internet-of-Things (IoT) isn’t a problem because it’s a lot of things that are inherently insecure, but because it’s a lot of inherently complicated things to manage. https://www.cylance.com/en_us/blog/your-cybersecurity-is-made-from-human-suffering.html
"Identification, you know, is a great thing that just works for people 100% of the time because you’ve never waved back at that person who was waving to the person behind you. Man that was awkward; we all saw it and we’re still laughing at you about it." https://www.cylance.com/en_us/blog/weaponized-authentication.html
Say what? Say OSSTMM! What's the newest research in security? Hear about it here: http://itpgsecure.com/osstmm-webinar/
Wow, honored to be listed among this group! https://blog.barkly.com/10-infosec-experts-we-are-thankful-for-2017
The current standard of infosec is to apply a mishmash of solutions to brute-force security onto an organization. Like a clumsy juggernaut it interferes with the organization's efficiency and productivity as it tramples friendliness. While many standards and frameworks exist, none provide an elegant cohesion of solutions that partners fluidly with an organization's efforts. That's my opinion and that's what I want to change.