The Queen Agrees

The Queen Agrees

| | Blog
Around 2006 / 2007 I began blogging and tried to get into video blogging. Although I’d been working in information security for 7 years up to that point, I wasn’t well-connected in terms of what conferences ran, who the influencers were, or who the editors of any of the numerous ... Read More

Social, the final frontier

| | Javnalysis
Social channels are an oft-overlooked area when it comes to information security. Social channels are left in the hands of marketing departments for customer engagement purposes. However, the adoption of social digital tools for the purposes of conducting business is widespread and largely unregulated, creating a major area of risk ... Read More

The user awareness landscape

Overall, technologies can be pretty straightforward to secure. Teach software not to execute a certain command, block a port, or alert on a set of conditions, and it will abide. Humans, on the other hand are not as easy to harden against attacks. These attacks are frequently delivered through emails, ... Read More

Security in the cloud

This video was prompted by discussions with someone that was adamant that they would never, never, everrrrr put their logs in the cloud. I enquired as to why they weren’t open to the option, and their response was that they don’t believe that sensitive information like logs should be in ... Read More

What is AlienVault

It’s coming up on my 3 year anniversary at AlienVault – and after a conversation with a friend, it dawned on me that I don’t think I’ve ever really explained what AlienVault does. So, when I was in Austin this last week I recruited some of my colleagues to help ... Read More

I think I’ve been hacked

A lot of individuals and companies of all sizes often use the phrase where they ‘think’ they’ve been hacked or breached, or had some form of unwanted event. There is usually a lack of conviction in this statement, and in hindsight it’s not easy to validate. Sure, one could use ... Read More

19 ways to say “Good job” to your security colleagues

Anytime we discuss security, it’s mainly to talk about the failures. So I’m taking time out today to spread some positivity to all those security folks that have made it through the week without an incident occurring ... Read More

Carphone Warehouse fined

via IFTTT After its 2015 breach, the Information Commissions Office (ICO) has released a very thorough report which highlights a number of deficiencies in Carphone Warehouse’s security. I’ve summed up some of the key points in dramatic fashion The report well worth a read: http://ift.tt/2AM6B7B ... Read More

Uncybered

It dawned on me, that I’ve never written a browser extension before. And there are words IT Security articles continually overuse that I wish they wouldn’t. So, I combined both these together and wrote a chrome extension that would change commonly misused words to something a little more interesting. Examples: ... Read More

M&A Mania

2018 has kicked off with a flurry of M&A activity in the infosec space. There have been four that I’ve been aware of, Barracuda acquired Phishline Cyxtera acquired Immunity Inc Verizon acquired Niddel Threatcare acquired Savage Security I wonder how many more deals will be announced between now and RSA ... Read More
Loading...