Women in Information Security: Beth Cornils

Last time, I had fun talking with Victoria Walberg. She really understands cloud and IoT cybersecurity. This time, I got to speak to Beth Cornils. She has a pretty cool job that involves making IoT cars safe! Kim Crawley: Hi Beth! Tell me about what you do. Beth Cornils: I am a product manager for … Read More The post Women in Information Security: Beth Cornils appeared first on The State of Security.
Read more

New EU General Data Protection Regulation (GDPR): An IT Security View – Part II

In the first part of “GDPR: An IT Security View”, we discussed some core objectives, characteristics, and principles of the GDPR, which is due to take effect on 25th May 2018. In this second article, we will discuss in greater depth some of the core IT security objectives relating to GDPR. The purpose of the GDPR is … Read More The post New EU General Data Protection Regulation (GDPR): An IT Security View – Part II appeared first on The State of Security.
Read more

Phishing Testing: Building Your Human Firewall

Phishing is becoming a major threat vector for organizations all around the world. Phishing is the exercise of sending illegitimate emails designed to elicit a response from the end user, whether that’s clicking on a link that infects them with malware or tricking the user into volunteering information that they normally would not provide like … Read More The post Phishing Testing: Building Your Human Firewall appeared first on The State of Security.
Read more

Blockchain 101: How This Emerging Technology Works

Unless you’ve been living in Slab City or off the grid for a while, you’ve probably heard this year’s omnipresent buzzword ‘blockchain.’ But perhaps you’re a bit clueless as to what this newer technology entails. In a recent HSBC survey of 12,000 respondents in 11 countries, 80 percent of people could not explain how blockchain … Read More The post Blockchain 101: How This Emerging Technology Works appeared first on The State of Security.
Read more

The Case of The Dark Web DDoS – Part 2

In part one of this two-part series, I described what we know about the September 14 attack against the drug sites on the Tor network. To review: The attack simultaneously took down 11 drug sites on the dark web, yet traffic patterns were unaffected. The site administrators indicated a problem on a public forum; and There was … Read More The post The Case of The Dark Web DDoS – Part 2 appeared first on The State of Security.
Read more

Women in Information Security: Victoria Walberg

Last time, I spoke with Nitha Suresh. She’s written IEEE papers and knows her stuff when it comes to pentesting and aircraft data networks. This time, I had the pleasure of interviewing Victoria Walberg. She has a lot of ideas when it comes to IoT and the cloud. Kimberly Crawley: Please tell me about what … Read More The post Women in Information Security: Victoria Walberg appeared first on The State of Security.
Read more

The Case of The Dark Web DDoS – Part 1

Think of all the recent DDoS attacks. They all seem to share the common trait of bad guys disrupting the normal flow of data against a legitimate business. Sometimes, these attacks are used for revenge, and other times, they are used for ransom. Sometimes, however, the bad guys become the targets. This is the story … Read More The post The Case of The Dark Web DDoS – Part 1 appeared first on The State of Security.
Read more

Advanced Soft Skills for Information Security: Efficacy

Soft skills are a hot topic in information security. You’ll see a lot of articles, blogs and talks on the subject. I’d like to go a little deeper – go beyond the basics of soft skills and talk about a concept from communication theory that can be used to achieve behavior change – efficacy. Efficacy … Read More The post Advanced Soft Skills for Information Security: Efficacy appeared first on The State of Security.
Read more

Hybrid Cloud and the Modern Data Center – Is Your Organization Already There?

While data center consolidation has been trending in government and commercial spaces since the 1970s, new government initiatives and directives released recently have created a new sense of urgency: those who haven’t yet consolidated are now required to. Many organizations are now looking to the cloud to meet the requirements. Whether they know it or … Read More The post Hybrid Cloud and the Modern Data Center – Is Your Organization Already There? appeared first on The State of Security.
Read more

DEF CON 25: A First-time Speaker Experience

I’ve been involved in information technology and infosec since the mid-1990s. Until recently, I had not been actively attending infosec or hacker conferences. I started attending DEF CON in 2013 when the conference was held at the Rio Hotel. DEF CON was the first hacker conference I ever attended. I did not know many in … Read More The post DEF CON 25: A First-time Speaker Experience appeared first on The State of Security.
Read more
Page 1 of 712345...Last »