Tags » Information Security

Data sharing and its security implication

For a change, this blog has little to do with wine. It is about provenance of data, which carries just about the same weight as in the context of wine, as I’ll describe later. 951 more words

"And the winner is... Compliance!"

Disclaimer: My comments below are based upon quotes from both Twitter and The Times of London on the UK’s TalkTalk breach; as a result the subsequent investigation and analysis may find that some of the assertions are in fact incorrect. 772 more words


Threat Report: Ransomware

Originally Posted at: http://christopher.killerpenguin.net/blog/threatreport-ransomware

written by: Christopher Furton

Threat- Ransomware and Digital Extortion

Industry has experienced a 4,000 percent increase in crypto-ransomware attacks where generic ransomware grew at 113% in 2014 ( (Symantec Corporation, 2015, p. 3,513 more words

Information Technology

What 80's pop can teach us about Rocket failure and incident management

Most accidents originate in actions committed by reasonable, rational individuals who were acting to achieve an assigned task in what they perceived to be a responsible and professional manner.

682 more words

Information Security & Ethical Hacking 101 @ PATTS

Last July 31, 2015, I gave a talk about Information Security and Ethical basics at PATTS College of Aeronautics in Paranaque City. It was quite challenging because the audience were not familiar with IT concepts. 97 more words