topheavysecurity.com
What difference does it make? | Fear Not the Assessor
https://topheavysecurity.com/2010/07/26/what-difference-does-it-make-2
Fear Not the Assessor. I am not the enemy, although I play one on TV. What difference does it make? July 26, 2010. How does it affect their PCI compliance? Short answer….it doesn’t. Merchants and service providers (SP) are required to perform the following routine tasks which a QSA then needs to validate as having been completed:. Daily review of audit logs. Quarterly internal vulnerability scans. Quarterly external vulnerability scans. Quarterly scans w/wireless analyzer. Annual internal penetration test.
topheavysecurity.com
SecurityBSides Turned Me into an Adult | Fear Not the Assessor
https://topheavysecurity.com/2010/12/13/securitybsides-turned-me-into-an-adult
Fear Not the Assessor. I am not the enemy, although I play one on TV. SecurityBSides Turned Me into an Adult. December 13, 2010. With the advent of Security BSides and its explosive growth with mini cons cropping up all over the US, and soon the world, many people see the movement as innovative and revitalizing local infosec. For me, however, BSides meant personal growth and a commitment to what I now see as my place in the information security community. December 13, 2010 at 9:12 AM. It’s nice to ...
twentiethmay.wordpress.com
twentiethmay | Locked up in an unknown world all by myself. Awaiting key holder. | Page 2
https://twentiethmay.wordpress.com/page/2
Locked up in an unknown world all by myself. Awaiting key holder. December 23, 2012. I miss how things were, when I just got to know you, the closeness we shared, the first time I cried after so many years, the secrets we shared. Newer posts →. Term break without the breaks. December 19, 2012. A nice song for a special girl to me, in case she still browse this blog. Newer posts →. You in my dream. December 5, 2012. Newer posts →. A life of uncertainties. November 20, 2012. I was glad that I had chance to...
twentiethmay.wordpress.com
只有你 | twentiethmay
https://twentiethmay.wordpress.com/2013/05/29/只有你
Locked up in an unknown world all by myself. Awaiting key holder. May 29, 2013. To the girl in my life. I love you. Final last big lap →. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. You are commenting using your Facebook account. ( Log Out. Notify me of new comments via email. Tan Jia Lin Jess.
twentiethmay.wordpress.com
Final last big lap | twentiethmay
https://twentiethmay.wordpress.com/2013/10/18/final-last-big-lap
Locked up in an unknown world all by myself. Awaiting key holder. Final last big lap. October 18, 2013. As usual, I have not been updating for quite a long time. Well, I’m not that much of a blogger, but just here to pen my thoughts. It has been around 2 years since I have started my pursue of Diploma in Business Information Technology. In short to say, we have been together for about 4 months after knowing and waiting for her for about 3 years. Though we don’t have any big fights, still we hav...You are...
runals.blogspot.com
Mark Runals' Blog: July 2014
http://runals.blogspot.com/2014_07_01_archive.html
Some sort of SIEM and InfoSec blog. Wednesday, July 16, 2014. So how big ARE Windows Logs? In my last post. Taming verbose Windows logs in Splunk. Thursday, July 3, 2014. Splunk User Activity - Apps and Dashboards. At some level time on this blog can be marked by when Im having a car worked on. Today isnt an exception. While that means the overall frequency is low the upshot is I get to spend my morning working in Chick-fil-A with some good breakfast in mah belly and good music in the background.
stephenrmoore.blogspot.com
stephen r. moore: shmoocon 2009
http://stephenrmoore.blogspot.com/2008/11/shmoocon-2009.html
Stephen r. moore. My professional, academic, and volunteer work in information assurance. Saturday, November 15. Glad I am staying at the Wardman Park Marriott . so the walk will be short. Any other Indy people going? Subscribe to: Post Comments (Atom). Founder of IndySec. MS in Information Assurance at Capitol College, with honors (2/27/2007). Join me at the next IndySec meeting [third Thursday of the month]. View my complete profile. ISP McColo Shut Down After Connection Found To Spa.
stephenrmoore.blogspot.com
stephen r. moore: ISP McColo Shut Down After Connection Found To Spammers
http://stephenrmoore.blogspot.com/2008/11/isp-mccolo-shut-down-after-connection.html
Stephen r. moore. My professional, academic, and volunteer work in information assurance. Saturday, November 15. ISP McColo Shut Down After Connection Found To Spammers. I can tell you the drop in our spam was around 35% - 40% after McColo was taken offline. Other reports are as high as 75%. Hats off to Hurricane Electric for booting em. Subscribe to: Post Comments (Atom). View my complete profile. ISP McColo Shut Down After Connection Found To Spa. Fourhourworkweek - Tim Ferriss.
stephenrmoore.blogspot.com
stephen r. moore: (IN)SECURE - September 2007
http://stephenrmoore.blogspot.com/2007/09/insecure-september-2007.html
Stephen r. moore. My professional, academic, and volunteer work in information assurance. Wednesday, September 26. IN)SECURE - September 2007. The September edition of (IN)SECURE magazine. Subscribe to: Post Comments (Atom). Founder of IndySec. MS in Information Assurance at Capitol College, with honors (2/27/2007). Join me at the next IndySec meeting [third Thursday of the month]. View my complete profile. IN)SECURE - September 2007. Fourhourworkweek - Tim Ferriss.
stephenrmoore.blogspot.com
stephen r. moore: Email RFC 2142
http://stephenrmoore.blogspot.com/2009/01/email-rfc-2142.html
Stephen r. moore. My professional, academic, and volunteer work in information assurance. Friday, January 9. I am always amazed at the wealth of talent on the SANS alumni email list. Yesterday, someone asked "what email address do you use for security? If someone discovers a vulnerability, issue, or breach how do you expect them to easily get a hold of you? Great question. Having some experience in this, I generally dredge their website or use Google. What I didn't know is RFC 2142.
SOCIAL ENGAGEMENT