exploringpossibilityspace.blogspot.com
Exploring Possibility Space: May 2014
http://exploringpossibilityspace.blogspot.com/2014_05_01_archive.html
Musings on risk, innovation, data science and my PhD dissertation. Thursday, May 1, 2014. Splitting this blog and moving to Octopress. I've decided to split this blog to separate my academic posts from my industry posts. I'm going to be blogging more about my dissertation and related works in progress, and I suspect that most of my industry readers won't be interested and I don't want to dilute my posts on industry topics - information security, risk, performance metrics, etc. Subscribe to: Posts (Atom).
assumebreach.blogspot.com
Assuming the breach: May 2015
http://assumebreach.blogspot.com/2015_05_01_archive.html
8220;We’ve just traced the attack. its coming from inside the house! 8221; How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail? Wednesday, May 20, 2015. Data Driven Security, Part 3 - Finally some answers! I am continuing my exploration inspired by Data Driven Security. In Part One,. Remember the data looks like this:.
securityevangelisteu.com
Python Adventures – 03 | Security-Evangelist.eu
https://securityevangelisteu.com/2014/08/20/python-adventures-03
All are welcome in the house of bytes. Python Adventures – 03. Sharing code and delving into Python and Pandas. My GitHub repository (which I must reorganize prior to sharing a link) where I will endeavor to post a copy of all the code I create for my Python Adventures. I look forward to open reviews and improvements. The Python and Pandas example based on Data-Driven Security. Python and Pandas data frame example similar to Data-Driven Security Listing 2-2. Create a new data frame. Import numpy as np.
securityevangelisteu.com
Chris Kubecka | Security-Evangelist.eu
https://securityevangelisteu.com/author/gossamersecevan
All are welcome in the house of bytes. Author Archive: Chris Kubecka. Cleaning crews and Keyloggers, oh my! Capture The Flag competitions are very useful ways to rethink and find creative solutions to solve the challenge. The Social Engineering CTF caused me to think a few angles I hadn’t considered before. Top item of the flag list: Is IT Support handled in house or outsourced? Posted in: DefCon 22. Say Cyber one more time. IT Security’s love hate relationship with the word Cyber. Posted in: DefCon 22.
securityevangelisteu.com
Python Adventures – 04 | Security-Evangelist.eu
https://securityevangelisteu.com/2014/08/21/python-adventures-04
All are welcome in the house of bytes. Python Adventures – 04. Getting a data set to play with! Book uses free tools and sources. In Chapter 3 the fun begins by gathering some data. The authors begin with AlienVault’s open source reputation database. It’s updated hourly and I noticed sometimes not available on the hour possibly due to traffic load. I used the following Python script, stored also on GitHub (to be linked) to get it the AlienVault data:. Similar to Listing 3-1. Similar to Listing 3-3. AvRep...
thestandarddeviant.com
#4 - Jay Jacobs on the cost of a data breach — The Standard Deviant Security Podcast
http://www.thestandarddeviant.com/the-standard-deviant-podcast/2015/6/18/episode-4-jay-jacobs-on
4 - Jay Jacobs on the cost of a data breach. June 19, 2015. The Verizon Data Breach Investigations Report (DBIR) is one of the most, if not. This year the DBIR tackled the cost of a data breach. For the last decade or so the standard accepted by the industry was the Ponemon Institute's model. The latest DBIR offers a new model, one that is build on a completely different data collection method than Ponemon's. Jay is also a co-founder of the Society of Information Risk Analysts. Release date: June 19, 2015.
securityevangelisteu.com
Python | Security-Evangelist.eu
https://securityevangelisteu.com/category/python
All are welcome in the house of bytes. Python Adventures – 05. Following the free E-book Learning Python the Hard Way. And getting down the basics of Python. In Exercise 1: A Good First Program. It’s how to write your very first Hello World! Bring up Canopy in Ubuntu or Windows and start a new script. Print “Hello there world! Print “Hello back to you! Print “I like typing with you.”. Print “Typing back is fun.”. Printing lines with Python.’. Print ‘Um, I’m not touching “that! Python Adventures – 04.
assumebreach.blogspot.com
Assuming the breach: Getting the Data for Data Driven Security, Part One
http://assumebreach.blogspot.com/2015/05/getting-data-for-data-driven-security.html
8220;We’ve just traced the attack. its coming from inside the house! 8221; How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail? Monday, May 18, 2015. Getting the Data for Data Driven Security, Part One. Continuing to building on my earlier post, " Questioning your security data. Well, I've had Jay and Bob's book. Note: the ...
blog.netsecure.com.ar
Epzylon | Netsecure Tech Blog
http://blog.netsecure.com.ar/author/ipv7-lord-epzylon
May 30, 2016. May 30, 2016. Les comparto una selección de podcast activos y muy buenos que he estado escuchando últimamente:. ANS Internet Storm Center Daily Network Security. Este podcast es breve y sale sin falta todos los dias, ideal para actualizarte durante la mañana. Brakeing Down Security podcast. Este podcast tiene muy buen nivel de los temas tratados, es un poco mas largo, una hora al menos y sale regularmente todas las semanas. Paul’s Security Weekly. Down the Security Rabbithole. April 25, 2016.
SOCIAL ENGAGEMENT