There is a hidden risk from line of business apps developed by small companies.
Watch more videos on my YouTube channel.
There is a hidden risk from line of business apps developed by small companies.
Watch more videos on my YouTube channel.
Using the golden triangle (scope, budget, time) and quality functional deployment (QFD) to make sound decisions on security tactics like vulnerability scanning.
Watch more videos on my YouTube channel.
Please describe your security mythology. A quick case study on myths and trends, based on yesterday’s Fortinet default credentials issue. Also, anyone successfully used witchcraft to fight malware?
Watch more videos on my YouTube channel.
On how to analyze the job market and create a career plan that capitalizes on your personal strengths. Differentiate yourself professionally.
Watch more videos on my YouTube channel.
If you can find the vulnerability, if you can see the vulnerability, don’t bring in a penetration testing firm to confirm the vulnerability. Clear off what you see first. Then have the pen tester find what you did not see.
Watch more videos on my YouTube channel.
As we move forward with identity and access management (IAM) initiatives, how much technical debt is there in our existing access controls?
Watch more videos on my YouTube channel.
Live from Codemash: the help desk as our first responders in incident response programs. Hat tip to @lnxdork, who is covering this practice in his Codemash talk.
Watch more videos on my YouTube channel.
Dell support gets compromised and this raises the bar for support scammers.
Watch more videos on my YouTube channel.
Some kudos to Valve for its response to the Christmas denial of service attack.
Watch more videos on my YouTube channel.
A quick video on my RSA submission: Finding Common Ground for Information Technology and Operational Technology.
Watch more videos on my YouTube channel.