[SANS ISC Diary] How was your stay at the Hotel La Playa?

I published the following diary on isc.sans.org: “How was your stay at the Hotel La Playa?“. I made the following demo for a customer in the scope of a security awareness event. When speaking to non-technical people, it’s always difficult to demonstrate how easily attackers can abuse of their devices and

[The post [SANS ISC Diary] How was your stay at the Hotel La Playa? has been first published on /dev/random]

Continue reading [SANS ISC Diary] How was your stay at the Hotel La Playa?

Sherlock Holmes for the InfoSec Crowd: 5 Steps to Becoming a Security Awareness Mastermind

The ever-fickle world of pop culture has seen a resurgence of interest in Sherlock Holmes in the last five years. Fresh re-imaginings of the detective residing at 221B Baker Street have come both to the big screen and small to varying degrees of critical acclaim. Robert Downey Jr.’s version premiered in 2009, while Benedict Cumberbatch’s […]… Read More

The post Sherlock Holmes for the InfoSec Crowd: 5 Steps to Becoming a Security Awareness Mastermind appeared first on The State of Security.

Continue reading Sherlock Holmes for the InfoSec Crowd: 5 Steps to Becoming a Security Awareness Mastermind

Sherlock Holmes for the InfoSec Crowd: 5 Steps to Becoming a Security Awareness Mastermind

The ever-fickle world of pop culture has seen a resurgence of interest in Sherlock Holmes in the last five years. Fresh re-imaginings of the detective residing at 221B Baker Street have come both to the big screen and small to varying degrees of critical acclaim. Robert Downey Jr.’s version premiered in 2009, while Benedict Cumberbatch’s […]… Read More

The post Sherlock Holmes for the InfoSec Crowd: 5 Steps to Becoming a Security Awareness Mastermind appeared first on The State of Security.

Continue reading Sherlock Holmes for the InfoSec Crowd: 5 Steps to Becoming a Security Awareness Mastermind

On Bringing the Board and IT Security Pros Together to Address Risk

Typically, security risks and challenges coming from your IT security team are only realized after there is an actual cyber security event. Things such as ransomware or DDoS attacks quickly become a priority for executives and place them in a responsive mode. Being proactive is sometimes difficult to quantify in the IT security world with a […]… Read More

The post On Bringing the Board and IT Security Pros Together to Address Risk appeared first on The State of Security.

Continue reading On Bringing the Board and IT Security Pros Together to Address Risk

Building a Security Culture

Building on the connection between breaking security policies and cheating, let’s look at a study[1] that asked participants to solve 20 simple maths problems and promised 50 cents for each correct answer. The participants were allowed to check their own answers and then shred the answer sheet, leaving no evidence of any potential cheating. The […]… Read More

The post Building a Security Culture appeared first on The State of Security.

Continue reading Building a Security Culture