I get a lot of feedback on my videos. One of the most common questions I get asked is whether someone can use a particular video of mine in a presentation they are doing internally at work or at a conference etc. It’s become a familiar process, I get an email from someone who starts … Continue reading Going Creative Commons
Category: Security
CISSP Reloaded Domain 2–Access Controls
This is my second post on my CISSP Reloaded where I am revisiting the 10 CISSP domains I studied for many years ago to see what has changes and how much of it I have retained as well as adding in my own personal thoughts and experiences into the mix. Read the introduction and first … Continue reading CISSP Reloaded Domain 2–Access Controls
CISSP Reloaded
What is a CISSP? A CISSP is many different things to different people. The ISC2 promote it as the premier security certification in the world and have you believe that with a CISSP comes great knowledge, power, mastery of the Force and an abundance of wealth. From a recruitment perspective these are the magic set … Continue reading CISSP Reloaded
Hitting the big time
I think I can officially say that I've hit the big time. Twist & Shout selected me for my ravishing good looks and acting skills to be their CISO elf in their video. Then Bruce Schneier linked http://www.schneier.com/blog/archives/2011/12/santa_hacked.html to the video saying that it was "Mildly Amusing". Of course, those close to Brucey will say … Continue reading Hitting the big time
A look at Infosec Island
Rather than giving a security roundup or predicting future security trends for 2012, I thought it a good idea to look at some of the security bloggers over at http://www.infosecisland.com over the course of the year.
Can you explain encryption to me.
From: Thomas, Kevin Sent: 24 August 2011 10:43To: Malik, Javvad Subject: Encryption Jav I’m updating the presentation pack for this months management meeting. Can you send me a short description of encryption so the SLT can better understand the solution. Kev From: Malik, JavvadSent: 24 August 2011 11:03To: Thomas, Kevin Subject: Encryption Hi Kevin, … Continue reading Can you explain encryption to me.
Input Validation
This week's episode has been hijacked by Girl Cynic. After a high level discussion with her on what input validation is all about, she thought she could make a better episode on the topic. I gave her the example of blacklisting as sugar is blacklisted from being put into my bikes petrol tank. So she … Continue reading Input Validation
SANS London 2011
This year I was fortunate enough to be accepted on SANS work-study scheme which means I’ll be attending my course like everyone else whilst at the same time facilitating and helping run the event. I’m quite looking forward to it, as it will give me the opportunity to wear the infamous red apron that all … Continue reading SANS London 2011
Google NoMap
Google recently stated that by adding _nomap to the end of your routers SSID will turn off location tracking services. This may be a stroke of genius, as there are many other applications for this concept.
Backtrack 5 Wireless Penetration Testing: Book Review
A book review of Backtrack 5 Wireless Penetration Testing by Vivek Ramachandaran. A great guide for beginners and even those with some experience in wireless penetration testing. Crammed full of tutorials so you are effectively led by your hand all step by step. The book adopts a progressive and simple-to-understand methodology whereby you are explained … Continue reading Backtrack 5 Wireless Penetration Testing: Book Review
