tacticalsecurityinc.wordpress.com
Gwen Bettwy | Tactical Security Inc's Blog
https://tacticalsecurityinc.wordpress.com/author/gwenbettwy
Tactical Security Inc’s Blog. The Experts who train your IT Security Experts. Author Archives: Gwen Bettwy. November 6, 2014. Targeted Phishing attacks are getting to be more prevalent. It is still a challenge to teach users to not write their passwords on a post it note and do not click on links in emails that look suspicious. Those emails are the generic phishing emails that most in the security world look at and know they are phishing emails. How do we help our users be paranoid? October 23, 2014.
tacticalsecurityinc.wordpress.com
Tactical Security Inc's Blog
https://tacticalsecurityinc.wordpress.com/tsi-and-1st-cavalry
Tactical Security Inc’s Blog. The Experts who train your IT Security Experts. Several of the founders of TSI have military backgrounds so it is always a special honor for us to be allowed to work with the worlds finest military. In 2008 we had the honor of training many of the soldiers in Fort Hood TX assigned to 1st Cavalry. This opportunity to help those who serve was capped when we recieved this letter of commendation. Leave a Reply Cancel reply. Enter your comment here. Address never made public).
tacticalsecurityinc.wordpress.com
General Security Musings | Tactical Security Inc's Blog
https://tacticalsecurityinc.wordpress.com/general-secuirty-musings
Tactical Security Inc’s Blog. The Experts who train your IT Security Experts. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. You are commenting using your Facebook account. ( Log Out. You are commenting using your Google account. ( Log Out. Notify me of new comments via email.
blueteamhandbook.com
Home
http://www.blueteamhandbook.com/home.html
Digital: VMLT from ExpandingSecurity.Com. BTHb is hosted through the VMLT. VMLT will be the digitalplatform for BTHb, so that users can receive easy updates and other information security and incident handling focused content as the NICCS INRE course is developed. Are the primary partners for the Blue Team Handbook. I met Dean B. back in 2004 at a SANS conference in Virginia Beach. Today, I own the ISSAP. Course and the Application Security domain for the CISSP. As of June 2015, about 10,200 copies sold!
austin-cs.org
Event Archive - IEEE Computer Society Austin Chapter
http://www.austin-cs.org/archive
IEEE Computer Society Austin Chapter. Click to join IEEECSAustin. The Austin Chapter of the IEEE Computer Society was restarted in April 2002 after being dormant for a few years. The chapter had at least 10 scheduled programs each year since. Monday, Jan 19. 2015 from 6:00 PM to 7:30 PM. Meters to Models: Using Residential Smart Meter Data to Predict and Control Home Energy Usage. PhD student in chemical engineering at the University of Texas at Austin. 2014 from 6:30 PM to 8:30 PM. 2014 6:30 - 8:30 PM.
tacticalsecurityinc.wordpress.com
Avoid IRS Problems – Backup | Tactical Security Inc's Blog
https://tacticalsecurityinc.wordpress.com/2014/08/26/avoid-irs-problems-backup
Tactical Security Inc’s Blog. The Experts who train your IT Security Experts. Two Step Google Authentiation. Data Hungry Apps →. Avoid IRS Problems – Backup. August 26, 2014. Recently, the IRS claimed that several emails from certain officials had been lost because of a failed laptop hard drive. They further claimed that the laptop was the only place those emails existed and that no copies existed anywhere else. Next, the organization needs to actually implement the defined strategies. Review and update ...
tacticalsecurityinc.wordpress.com
Two Step Google Authentiation | Tactical Security Inc's Blog
https://tacticalsecurityinc.wordpress.com/2014/08/26/two-step-google-authentiation
Tactical Security Inc’s Blog. The Experts who train your IT Security Experts. Avoid IRS Problems – Backup →. Two Step Google Authentiation. August 26, 2014. So when was the last time you changed your bank password, your gmail password, your amazon password, etc? Http:/ www.wired.com/2012/08/apple-amazon-mat-honan-hacking/all/. Https:/ www.google.com/landing/2step/. This entry was posted in Uncategorized. Avoid IRS Problems – Backup →. Leave a Reply Cancel reply. Enter your comment here. You are commentin...
tacticalsecurityinc.wordpress.com
Data Hungry Apps | Tactical Security Inc's Blog
https://tacticalsecurityinc.wordpress.com/2014/10/23/data-hungry-apps
Tactical Security Inc’s Blog. The Experts who train your IT Security Experts. Avoid IRS Problems – Backup. Targeted Phishing →. October 23, 2014. Oh dear… the data our downloaded apps may be trying to steal from us. I just stumbled on this article:. Https:/ www.yahoo.com/tech/the-hidden-privacy-threat-of-flashlight-apps-100586520044.html. And it reminded me of how unsafe our phones can be. We really must be vigilant and check the privacy settings of all of the apps that we download!
SOCIAL ENGAGEMENT