Hot Topics
Space Invaders and Website Security -

A couple of months ago I got invited to speak at ShowMeCon I based my talk how to relate building an IT security. 

5 hours ago | 0
TorrentLocker Unlocked … For Now -

There has been a lot of publicity on Ransomware campaigns compromising various targets (I posted on CryptoLocker HERE and. 

2 days ago | 0
How to configure an ASA with built-in Sourcefire Firepower home lab -

For those following Cisco security, you probably know Cisco acquired Sourcefire last year (more found HERE). The. 

4 days ago | 0

Space Invaders and Website Security

By Aamir Lakhani | On Tue, Sep 30th, 2014 - No Comments »
space_invader

A couple of months ago I got invited to speak at ShowMeCon I based my talk how to relate building an IT security awareness program using the same tricks and mindset you would in in team strategy video games in a talk titled, Power-Ups and Princesses.  My friend, Peter Zavlaris wrote an excellent piece on the RiskIQ blog. I recommend you check it out. Traditionally, the most formidable approach. 

TorrentLocker Unlocked … For Now

By Joey Muniz | On Mon, Sep 29th, 2014 - No Comments »
ransom1

There has been a lot of publicity on Ransomware campaigns compromising various targets (I posted on CryptoLocker HERE and Ransomware spreading in the wild HERE). For those that don’t know what Ransomware is, its malware that encrypts your data and holds it ransom for a fee to unlock it. The cost to get your data back can be anything from hundreds to thousands of dollars. Plus you. 

How to configure an ASA with built-in Sourcefire Firepower home lab

By Joey Muniz | On Fri, Sep 26th, 2014 - No Comments »
sourcefire-logo

For those following Cisco security, you probably know Cisco acquired Sourcefire last year (more found HERE). The most anticipated release has been adding Sourcefire’s flagship Firepower offering inside Cisco’s most popular firewall offering the Adaptive Security Appliance (ASA). As of September 16th, this offering is officially available. You can find data sheets, configuration guides. 

Shellshock – 22 year internet vulnerability could be the biggest yet

By Aamir Lakhani | On Thu, Sep 25th, 2014 - 1 Comment
remote exploit example

Security researcher, Stephane Schazelas found a major vulnerability that allows attackers to execute and run code in bash shell. A shell is found on most UNIX, Linux, and Mac operating systems. Users interact it with it thru the terminal program. It is the place to input and run commands for the operating system, as well as accept basic programming for the system. In other words, it is the. 

A holistic security architecture – Attack Mitigation Network (AMN)

By Aamir Lakhani | On Wed, Sep 24th, 2014 - No Comments »
ddos_fig01

A holistic security architecture – Attack Mitigation Network (AMN) – addresses these emerging security challenges offering the widest attack coverage and shortest time to mitigate. Download this white paper NOW to learn how to: Maintain business continuity even when under attack Interface with emerging security applications Protect against all types of availability-based threats Reduce. 

How to talk infosec with kids

By Aamir Lakhani | On Fri, Sep 19th, 2014 - No Comments »
CodyWelcome_Web_blub

Chase Cunningham – The Cynja, on Wednesday, 17 September 2014 wrote an article for Help Net Security around speaking inforsec with kids. As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like me, chances are you’re concerned about your kids using the Internet. As they. 

Alter your perspective. An outside looking in approach to security

By Aamir Lakhani | On Thu, Sep 18th, 2014 - No Comments »
Alter_perspective

My friend Peter Nicolas Zavlaris at RiskIQ posted a great blog. Check out the RiskIQ Blog. It is a great source around information and cyber security. By Peter Zavlaris As the Internet continues to take a public relations drubbing due to the constant cadence of data breach reports and instances of online fraud—it’s important to maintain perspective.  Let’s face it, the Internet. 

Leveraging Reputation As A Security Defense

By Joey Muniz | On Thu, Sep 18th, 2014 - 1 Comment
repsec

What is reputation? By definition “Reputation is the opinion (more technically, a social evaluation) of the group of entities toward a person, a group of people, or an organization on a certain criterion. It is an important factor in many fields, such as education, business, online communities or social status”. Older security technologies use signatures of known bad elements however.