Jun 17 2020

AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever | ZDNet

Category: DDoS,Information SecurityDISC @ 12:34 pm

The previous record for the largest DDoS attack ever recorded was of 1.7 Tbps, recorded in March 2018.

Source: AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever | ZDNet



Was the US hit by a massive ‘DDoS attack’?
httpv://www.youtube.com/watch?v=54IJil_rZkY

What is DDOS? Is America Under a Foreign Cyber Attack?!
httpv://www.youtube.com/watch?v=Sp5ZgIGunTc



Would like to know more on InfoSec Awareness…

Download a Security Risk Assessment steps paper!

Download a vCISO template

Subscribe to DISC InfoSec blog by Email




Jun 14 2020

Tech firms suspend use of ‘biased’ facial recognition technology

Amazon, IBM and now Microsoft ban the sale of facial recognition technology to police departments and are urging for federal laws to regulate its use.

Source: Tech firms suspend use of ‘biased’ facial recognition technology

Download a Security Risk Assessment steps paper!

Download a vCISO template

Subscribe to DISC InfoSec blog by Email



Why Cities Are Banning Facial Recognition Technology | WIRED
httpv://www.youtube.com/watch?v=sYftT5YgwVI

Facial-recognition technology: safe or scary?
httpv://www.youtube.com/watch?v=-yvxbi5GMnA



ARTIFICIAL INTELLIGENCE Dangers to Humanity: AI, U.S., China, Big Tech, Facial Recogniton, Drones, Smart Phones, IoT, 5G, Robotics, Cybernetics, & Bio-Digital Social Programming


Jun 10 2020

Deepfakes Are Going To Wreak Havoc On Society. We Are Not Prepared.

Category: Deepfakes,Information SecurityDISC @ 4:44 pm

In the months and years ahead, deepfakes threaten to grow from an Internet oddity to a widely destructive political and social force.

Source: Deepfakes Are Going To Wreak Havoc On Society. We Are Not Prepared.

Best Of Deep Fakes Compilation
httpv://www.youtube.com/watch?v=xkqflKC64IM

Funniest DeepFakes *Compilation* II.
httpv://www.youtube.com/watch?v=RpRlrrNwr4U

Download a Security Risk Assessment steps paper!

Download a vCISO template

Subscribe to DISC InfoSec blog by Email


Jun 04 2020

Hackers steal secrets from US nuclear missile contractor

Category: Hacking,Information SecurityDISC @ 1:15 pm

Cyber extortionists have stolen sensitive data from a company which supports the US Minuteman III nuclear deterrent.

Source: Hackers steal secrets from US nuclear missile contractor

Download a Security Risk Assessment steps paper!

Subscribe to DISC InfoSec blog by Email


Jun 02 2020

Our latest InfoSec poll results

Category: Information SecurityDISC @ 12:28 pm

Please share your thoughts and vote, if poll has not expired yet.

Download a Security Risk Assessment steps paper!

Subscribe to DISC InfoSec blog by Email


May 31 2020

State-Based Contact Tracing Apps Could Be a Mess

Category: Information Privacy,Information SecurityDISC @ 12:15 pm

With no nationwide Covid-19 notification software in sight, security and interoperability issues loom large.

Source: State-Based Contact Tracing Apps Could Be a Mess



Big Tech’s Contact-Tracing Apps Might Make Things Worse | Mashable
httpv://www.youtube.com/watch?v=ViA0xR5q_w4

Coronavirus outbreak: What are the privacy risks behind ‘contact tracing’ apps?
httpv://www.youtube.com/watch?v=FmbOxY7yBL0


Ebola virus disease contact tracing activities, lessons learned

Download a Security Risk Assessment Checklist paper!

Subscribe to DISC InfoSec blog by Email


Apr 26 2020

CyberSecurity for Dummies

Category: cyber security,Information SecurityDISC @ 12:22 am

CyberSecurity for Dummies

Open a PDF file The best practice guide for an effective infoSec function.

 
Introduction to Cybersecurity
httpv://www.youtube.com/watch?v=ULGILG-ZhO0

What You Should Learn Before Cybersecurity




Subscribe to DISC InfoSec blog by Email


Apr 25 2020

Preparing a Secure Evolution to 5G

Category: cyber security,Information Security,Wi-Fi SecurityDISC @ 12:23 pm

5G CYBERSECURITY

Preparing a Secure Evolution to 5G

[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/04/5G-CYBERSECURITY.pdf” title=”5G CYBERSECURITY”]



Tech Talk: 5G Security
httpv://www.youtube.com/watch?v=7ETDxh2d2sU

Security of 5G networks: EU Member States complete national risk assessments
httpv://www.youtube.com/watch?v=O_Jt9wp9FDc

Bye bye privacy with 5G
httpv://www.youtube.com/watch?v=a0359OG6CyY




Subscribe to DISC InfoSec blog by Email

Tags: 5G privacy, 5G security


Apr 14 2020

Comprehensive open source free tools list

Category: Information SecurityDISC @ 10:34 am

SANS Faculty has a comprehensive open source free tools available to support your information security career, training and research.

[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/04/SANS-Free-tool-list.pdf” title=”SANS Free tool list”]

to download pdf for open source free tools list



Open Source Tools For Working Remotely From Home: pfsense, OpenVPN, Syncthing, and Nextcloud
httpv://www.youtube.com/watch?v=UHzAke2oyfo




Subscribe to DISC InfoSec blog by Email


Jan 29 2020

Tokenization vs. Encryption vs. Aliasing – How to Truly Minimize Compliance Risk

Category: Cryptograghy,Information SecurityDISC @ 10:17 pm

 

https://en.wikipedia.org/wiki/Tokenization_(data_security)

Source: Tokenization vs. Encryption vs. Aliasing – How to Truly Minimize Compliance Risk

The tokenization of things | Matthew Roszak | TEDxSanFrancisco
httpv://www.youtube.com/watch?v=Rto-earGcxg


Subscribe to DISC InfoSec blog by Email


Dec 07 2019

NIST CyberSecurity Framework and ISO 27001

Category: Information Security,ISO 27k,NIST CSFDISC @ 6:54 pm

NIST CyberSecurity Framework and ISO 27001

[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2019/12/NIST_ISO_Green_Paper_NEW_V3___Final_Edits.pdf”]

How to get started with the NIST Cybersecurity Framework (CSF) – Includes Preso

Written Information Security Program (WISP) – ISO 27002, NIST Cybersecurity Framework & NIST 800-53
httpv://www.youtube.com/watch?v=B8QjwD6f4rc

What is ISO 27001?
httpv://www.youtube.com/watch?v=AzSJyfjIFMw

Virtual Session: NIST Cybersecurity Framework Explained
httpv://www.youtube.com/watch?v=nFUyCrSnR68





Enter your email address:

Delivered by FeedBurner

Tags: iso 27001, NIST CSF, NIST RMF


Nov 21 2019

Five Keys for Building a Security program

Category: Information SecurityDISC @ 11:00 pm


https://www.sans.org/media/critical-security-controls/Poster_CIS-Security-Controls_2018.pdf
The best practice guide for an effective infoSec function

Five Keys for Building a Security program

Open a PDF file Five Keys for Building a Security Program.

 


Enter your email address:

Delivered by FeedBurner


Oct 21 2019

6 Essential Pillars for InfoSec Prioritization

Category: Information SecurityDISC @ 11:22 am

It may be time to Think Differently in security.

Do you know which of your vulnerabilities are critical, those which can wait a day, vs ones that are just noise? Read this handy guide to get the 6 essential pillars for comprehensive InfoSec prioritization:



The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac
httpv://www.youtube.com/watch?v=_nVq7f26-Uo

Your 5 Year Path: Success in Infosec
httpv://www.youtube.com/watch?v=Uv-AfK7PkxU

Top 20 Security Controls for a More Secure Infrastructure


Subscribe to DISC InfoSec blog by Email

Tags: isms, Secure Infrastructure


Oct 14 2019

The best practice guide for an effective infoSec function

Building ISMS

The best practice guide for an effective infoSec function: iTnews has put together a bit of advice from various controls including ISO 27k and NIST CSF to guide you through what’s needed to build an effective information security management system (ISMS) within your organization.

This comprehensive report is a must-have reference for executives, senior managers and folks interested in the information security management area.

 

Practice Guide

Open a PDF file The best practice guide for an effective infoSec function.

How to Build a Cybersecurity Program based on the NIST Cybersecurity Framework
httpv://www.youtube.com/watch?v=pDra0cy5WZI

Beginners ultimate guide to ISO 27001 Information Security Management Systems
httpv://www.youtube.com/watch?v=LytISQyhQVE

Conducting a cybersecurity risk assessment


Subscribe to DISC InfoSec blog by Email

Tags: isms


Sep 26 2019

Live and let live InfoSec

User vs Security

secret password
Live and let live InfoSec

The average person’s take on security control: they have real jobs to do, and security isn’t one of them. so remember ‘usability vs bypass security control’ when designing a new control. Please feel free to share your opinion on this.



Funny business meeting illustrating how hard it is for an (infosec) engineer to fit into the corporate world!
httpv://www.youtube.com/watch?v=BKorP55Aqvg

parkour vs security chase
httpv://www.youtube.com/watch?v=Hnv5OOpr4ug


Subscribe to DISC InfoSec blog by Email


May 03 2019

Creating A Cyber Secure Home

Category: Information Security,IoT SecurityDISC @ 9:23 am

Creating A Cyber Secure Home – Infographic via SANS Institute

 Subscribe in a reader

Tags: cyber secure home, home security


Apr 03 2019

Hospital viruses: Fake cancerous nodes in CT scans, created by malware, trick radiologists

Category: Antivirus,Information SecurityDISC @ 3:50 pm

Researchers in Israel created malware to draw attention to serious security weaknesses in medical imaging equipment and networks.

Source: Hospital viruses: Fake cancerous nodes in CT scans, created by malware, trick radiologists

  • Malware Analysis


  • Apr 01 2019

    Just Having A Security Product Doesn’t Make You Secure

    Category: Information Security,ISO 27kDISC @ 5:31 pm

    Every day, big companies are still getting breached despite their security products. F-Secure’s Mikko Hypponen warns that companies that say ‘use our technology and you will not have a breach’ actually make it much harder for clients to think about and be ready for a breach.

    Source: Just Having A Security Product Doesn’t Make You Secure



    Mar 09 2019

    Google Says Upgrade To Windows 10 After Critical Flaws Found In Chrome And Windows 7

    Category: Information Security,Security patchingDISC @ 11:54 am

    Hot on the heels of disclosing a critical zero-day vulnerability in Chrome that was being exploited in the wild by attackers, Google has now uncovered another critical zero-day that is being used alongside it to take over Windows machines.

    Source: Google Says Upgrade To Windows 10 After Critical Flaws Found In Chrome And Windows 7



    Mar 05 2019

    Comcast security nightmare: default ‘0000’ PIN on everybody’s account

    Category: Information SecurityDISC @ 10:29 am

    It didn’t require an account PIN to switch carriers. Everybody uses 0000, it said, making it easier for customers… and phone hijackers.

    Source: Comcast security nightmare: default ‘0000’ PIN on everybody’s account

  • Best Practice Information Security
  • Enter your email address:

    Delivered by FeedBurner


    « Previous PageNext Page »