Robert M. Lee’s & Jeff Hass’ Little Bobby Comics, ‘Doughnuts’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Hass at Little Bobby Comics.
Permalink
The post Robert M. Lee’s & Jeff Hass’ Little B… Continue reading Robert M. Lee’s & Jeff Hass’ Little Bobby Comics, ‘Doughnuts’

SANS DFIR, Sherrie Caltagirone’s ‘Classifying Evil: Lessons From Hunting Human Traffickers’

Thanks to SANS for publishing the SANS DFIR
superlative DFIR videos on their SANS DFIR YouTube Channel
Permalink
The post SANS DFIR, Sherrie Caltagirone’s ‘Classifying Evil: Lessons From Hunting Human Traffickers’ appeared first on… Continue reading SANS DFIR, Sherrie Caltagirone’s ‘Classifying Evil: Lessons From Hunting Human Traffickers’

When Digital Identity and Access Management Meets Physical Security

If your identity and access management (IAM) and physical security initiatives are not working as one, your organization may be suffering from unnecessary grief — and increasing risk.

The post When Digital Identity and Access Management Meets Physical Security appeared first on Security Intelligence.

Continue reading When Digital Identity and Access Management Meets Physical Security

Security BSides London 2019, Olga Zilberberg’s ‘Understanding Stress, Anxiety And Depression And How To Cope’

Many thanks to Security BSides London for publishing their outstanding conference videos on YouTube.
Permalink
The post Security BSides London 2019, Olga Zilberberg’s ‘Understanding Stress, Anxiety And Depression And How To Cope’ app… Continue reading Security BSides London 2019, Olga Zilberberg’s ‘Understanding Stress, Anxiety And Depression And How To Cope’

Three Most Common Security Flaws (and How to Fix Them)

When it comes to physical security, the most common things we see are hardware vulnerabilities or human error (through social engineering attacks, failure to follow security guidelines, or no knowledge of security protocols). We have successfully broken into everything from locally run neighborhood shops to banks, power plants, hospitals, factories, law firms, and everything in…

The post Three Most Common Security Flaws (and How to Fix Them) appeared first on TrustedSec.

Continue reading Three Most Common Security Flaws (and How to Fix Them)

What is NERC?

NERC CIP Standards Background and Basics The North American Electic Reliability Corporation (NERC) is an international regulatory organization that works to reduce risks to power grid infrastructure. They do this through the continual development of a … Continue reading What is NERC?

From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses

Reading Time: 6 minutes Here are the top five ATM security vulnerabilities that X-Force Red, IBM Security’s team of veteran hackers, has uncovered during its many years of performing ATM penetration tests.

The post From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses appeared first on Security Intelligence.

Continue reading From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses

Richard A. Clarke, Interviewed

Image Attribution – Photographer: Aude – Own work, CC BY-SA 3.0
FastCompany contributing editor Alex Pasternack has written-up a superb interview piece with the highly respected Richard A. Clarke, detailing his warnings of significant attack modalitie… Continue reading Richard A. Clarke, Interviewed