Candidate
Cybersecurity is Not Up for Debate
Taking a Look at Cybersecurity’s Future in Legislation With the presidential debates behind us, and the election day looming, the issue of cybersecurity still remains largely untouched. While a passing topic at some point in each of the debates, the only direct question ever addressing the issue was from the first debate. Moderator Lester Holt…
Read MoreRecruiters getting spammed!
I know what some of you are thinking, how do you like it now the shoe is on the other foot? Well I don’t but not only because I don’t like being spammed…. I mean who does? More because some of the stuff I get is the exact reason why all recruiters get tarred with…
Read MoreIT Phone Home
The Challenge of Connecting Mobile Apps to IoT Devices in Homes A challenge for home automation developers is how can something sitting in your home network, which is presumably on a private network behind a firewall hidden from hackers, be readily available to a mobile app which could be potentially anywhere in the world. When you receive the little…
Read MoreSomeone’s Hacked My Toaster!
IoT Security Hysteria & Some Development Tips to Avoid Being Called Out at Defcon Being in the fairly uncommon position of founding both security and mobile app development companies, I get to play poacher and gamekeeper on a daily basis. For my American friends, that’s offense and defense! I wanted to add a little value from…
Read MoreKickstart your Career in InfoSec with the Peerlyst Guide
Cyber security is one of the fastest growing job markets in the world today, though newcomers can find breaking into the field a difficult feat. Yet, with Forbes reporting a growth of over $90 billion in the next four years, there seems to be no time like the present to make a career switch. Thanks to…
Read MoreCyber Insurance 2: There’s a New Sheriff in Town
I believe that Cyber Insurance (CI) will be the driving force behind information security over the next three to five years. CI will have the same kind of effect that car insurance has had on car safety and security, or that life insurance has had in changing the types of lifestyles most of us lead.…
Read MoreSpear Phishing an old tactic using new distribution?
Phishing using data URI’s embedded in websites distributed using URL shortening services.
Read MoreFuture Wars Fought in Cyber Space?
USA General admits to cyber attacks in the middle east, we look at the history of cyber warfare.
Read MoreRemote Working And Increasing Security Risks
Increases in remote data availability are allowing more firms to utilize remote workers, increasing their security risks.
Read MoreHackers Release Peoples Credit Histories
A statement released by Team GhostShell a group affiliated to Hacktivists Anonymous , claimed they have hacked into over 100 websites over the weekend. They gained access to passwords, documents and some data that even included credit histories. The hackers claim over 1 Million records have been leaked on the web. Analysis of the attack…
Read More