-
Forever being the advocate of resilient and high quality Information Technology (IT) infrastructure (a geek), I frequently get pulled into not-so-uber-sexy-cyber-security projects for friends and neighbors. This one time, a…
-
Slide deck from April 2014 ISC2TC meeting. Twitter handles: @OWASPMN @OWASP @Veracode @DarrenPMeyer @john_pescatore @WeldPond…
-
Significant OpenSSL Vulnerability (CVE-2014-0160) with PoC the wild. While only a CVSS 5, due to its memory grabbing ability, this is a CODE UPGRADE-NOW. This is OpenSSL vulnerability is testable…
-
The Courage of Brian Krebs by Bill Brenner at OCD Diaries brings to forefront of the "security industry journalism" disucssion many great points which are delivered well with the provided…
-
The U.S. National Security Agency knew (about Heartbleed) for at least two years via Michael Riley @ Bloomberg The U.S. National Security Agency knew for at least two years…
-
Thank you very much to the Saint Paul College ACM Club for the opportunity to provide the Keynote presentation for their Cyber Security Workshop.…
-
Minn. Stat. §§ 325E.61: DATA WAREHOUSES; NOTICE REQUIRED FOR CERTAIN DISCLOSURES. 325E.61 (d) For purposes of this section and section 13.055, subdivision 6, "breach of the security of…
-
In order to be effective, you must know what you are trying to protect. Further, you can reuse your financial audit information to help accomplish this. Download a local copy…
-
This cute kitten is harboring a malicious test file, four different ways, that every anti-virus should detect, don't blow your whole budget on buzzword bingo "anti-virus" software. Start with the…
-
Security on a Shoestring Budget Original Security on a Shoestring Budget (SOSB Slide Deck) with Notes at Github. Follow the SOSB developing series.…