The Cheeseburger Principle of Cloud Compliance

“I like mine with lettuce and tomato Heinz 57 and French fried potatoes Big kosher pickle and a cold draught beer Well, good God almighty, which way do I steer… …for my cheeseburger in paradise?” – Jimmy Buffett, Cheeseburger in Paradise Our CEO, Tim Prendergast, dropped some deep philosophical knowledge on me today. It came... Read more » The post The Cheeseburger Principle of Cloud Compliance appeared first on Cloud Sentry Blog.
Read more

The Top 17 Information Security Conferences of 2018

With 2017 now in the rear-view mirror, the security industry is turning its attention to 2018. The new year will no doubt present its fair share of challenging digital security threats. So too will it present numerous opportunities for infosec professionals to discuss shared difficulties at conferences and summits. To help promote these collaborative events, … Read More The post The Top 17 Information Security Conferences of 2018 appeared first on The State of Security.
Read more

Cloud Security This Week – January 5, 2018

New from Evident.io In Response to Meltdown and Spectre As these two security vulnerabilities begin a path of destruction across a variety of devices and environments, rapid response plans are being put into place to apply patches and update systems. Here’s Evident.io’s statement on our plan and explanation for how we are supporting efforts to... Read more » The post Cloud Security This Week – January 5, 2018 appeared first on Cloud Sentry Blog.
Read more

Hacker Flooded Tourism Agency’s Facebook Page with Bizarre Posts

A hacker commandeered a tourism agency’s Facebook page and abused that unauthorized access to make a series of bizarre postings. Early in the morning on 4 December, the Facebook page for Explore Minnesota Tourism began publishing some unusual content. The stories consisted of fake news items with headlines such as “Detroit woman gives birth to … Read More The post Hacker Flooded Tourism Agency’s Facebook Page with Bizarre Posts appeared first on The State of Security.
Read more

Unthinkable! Hackers Loot Charity’s Funds Right Before Christmas Season

Hackers have done the unthinkable by making off with a charity’s funds right before the start of the 2017 Christmas season. The Utah Association for Intellectual Disabilities (UAID) first noticed something was wrong when it had not received any new email applications for help since 22 October. Typically, the charity gets numerous applications in preparation … Read More The post Unthinkable! Hackers Loot Charity’s Funds Right Before Christmas Season appeared first on The State of Security.
Read more

Women in Information Security: Keren Elazari

Last time, I spoke with Kim Wong, a woman who recently acquired a cybersecurity role in Britain’s financial services industry. This time, I’m honored to speak with Keren Elazari. Not only has she given TED talks; she also founded BSidesTLV in Tel Aviv, Israel. We had a wonderful chat! Kimberly Crawley: Please tell me a … Read More The post Women in Information Security: Keren Elazari appeared first on The State of Security.
Read more

Scammer, Meet Hacker: Part 3

Posing as a target in a job scam to see how deep the rabbit hole goes…In part 2, our involvement became more than just a chat, and the scammers started trying to get some money out of me in earnest. Their persistence is as impressive as their lack of attention to detail is bewildering. You’d think scammers this organized and prepared would be able to keep the name of a company straight, especially when they’re supposedly a hiring manager for said company. If we accept the idea that attackers are only as sophisticated as they need to be, the average victim must not notice that the name of the business changes, chooses not to challenge the scammers on the discrepancy or is just so desperate for the job and money that they don’t care.Here, in part 3, the scam leaves the virtual world and enters the physical. Let’s dive in.This image really becomes relevant in this post. You’ll see :)Step 10: How scammers make money from thin airThe process of how a totally fake, made up check, can become real, spendable US dollars, and in the process, ruin the victim’s day (or week, or month!).After emailing me a .pdf of a fake Chase...
Read more

Women in Information Security: Keirsten Brager

My interviews with women and non-males in cybersecurity here on The State of Security have been very popular. Last month, when I looked for subjects for the third “Women in Information Security” series, I got an overwhelming response! The first person I interviewed for this next wave of interviews was security engineer Keirsten Brager. We had … Read More The post Women in Information Security: Keirsten Brager appeared first on The State of Security.
Read more
Page 1 of 212