Edit: Despite almost qualifying as a senior citizen, my award-winning friend Thom Langford agreed to write me a guest post (seeing as he writes guests posts for everyone else). I did not impose any conditions except that the topic be relevant and not self-serving in the slightest. I found myself writing an article that I didn’t … Continue reading An Article about Information Security Articles
Author: j4vv4d
Photos in the cloud
We put 'stuff' in the cloud all the time - and most of the time, that's perfectly fine because there aren't any state secrets or self-incriminating evidence contained. The convenience factor it offers typically outweighs the risks. Having said that, it's always worthwhile evaluating the risks - in particular when using photo backups from your … Continue reading Photos in the cloud
Vegas from afar
One of the rules from our Infosec Rockstar video was that even if you can’t attend a con, you should tweet as if you’re there. Well, I kind of messed up on that tweeting part – but despite me not being at Bsides, Blackhat or Defcon this week, I’ve been living vicariously through the tweets … Continue reading Vegas from afar
A recap for Eve and Gillis
I often shoot myself in the foot by agreeing to doing things and then realizing it eats up a lot more of my time than I’d originally anticipated which is why I haven’t been blogging or making videos much recently. Some of the things that have been consuming my life lately have included (cue fast-paced … Continue reading A recap for Eve and Gillis
Interview with the BatCISO
With so many breaches occurring on a regular basis, perhaps it's time for a new kind of CISO. A Bat CISO!
Infosec conferences – client side vs server side
Because infosec has cured cancer, ended poverty and created a utopian paradise that the villain in Demolistion Man could only dream of – the industry often finds itself trying to fix the really big issues via twitter and other social media platforms as well as within the hallways of conferences as to what is wrong … Continue reading Infosec conferences – client side vs server side
Security and the cobra effect
Some people just want to watch the world burn. Others just want to give bad security advice. Check out Troy Hunt's blog post on the matter.
The CISSP companion handbook: A collection of tales, experiences and straight up fabrications fitted into the 10 CISSP domains of information security
I didn’t write the book, the book wrote me. Which is kind of true because I kind of wrote a lot of stuff independently and then combined it with some of my old notes that I took whilst preparing for the exam and scoured through old emails for the rest. It’s definitely not something … Continue reading The CISSP companion handbook: A collection of tales, experiences and straight up fabrications fitted into the 10 CISSP domains of information security
We won!!!
If you like to keep up with my ramblings on the Facebook or twitter, you'd probably have seen that not only was I nominated in several categories for the European Security Bloggers Awards, but so was Girl Cynic. Well, apparently Girl Cynic has been doing something right because she won the award for most entertaining … Continue reading We won!!!
Spotting phishing scam emails
Phishing emails can be nasty pieces of work. They put a lot of effort into appearing legitimate in order to trick users into falling for their scams. In this video, I only take a look at this one specific email which claimed to come from Apple. There are lots of signs to look out for … Continue reading Spotting phishing scam emails
