Information Security

Completed Master of Science, Information Security and Assurance

If you have been following my website, which you probably haven't since I don't update often enough to keep it interesting, but anyway; I started to go back to school to get my Bachelors of Science degree in 2011. When I started I knew that the B.S. should only be the beginning, after all, I had been in the technology industry and career field for 18 years. So my intent was to complete the B.S. and go directly into an advanced degree. When I completed the first degree 17 months later in 2013, I wasn't sure which direction to go.

Information Security week in review

Some of the interesting news articles in regards to Information Security this week, read more for details

  • XSS vulnerability in Skype could allow 3rd party to change passwords
  • Undersea communications cables are cut every 3 days
  • Apple iOS 4.3.4 release & Jailbroken
  • FBI Arrest 14 in relation Anonymous / PayPal case
  • Internet Activist Aaron Swartz Charged in M.I.T. Data Theft
  • Anonymous Claims Hack of NATO, Sends Warning to FBI
  • BING DNS hijacked? SANS says it looks like it
  • Three pizza chains ATMs hacked

Cyber Camp Develops Tomorrow’s IT Security Pros

Government Technology website has an article about an information security challenge:


At 10:49 a.m. last Friday, Prof. Dan Manson cupped his hands over his mouth and shouted to seven teams of five eager people that they could begin a virtual Capture the Flag competition at the 2011 U.S. Cyber Challenge Summer Camp at Cal Poly Pomona. 
 
The players manned laptops and began the simulation in which they entered a network to infiltrate servers, conduct penetration tests, analyze attacks and contents of files, overtake control of networked services and crack passwords. 

Interesting day in information security

Today has been a big day for news in the Information Security. The Department of Justice has the news on their own website regarding "Sixteen Individuals Arrested in the United States for Alleged Roles in Cyber Attacks More Than 35 Search Warrants Executed in United States, Five Arrests in Europe as Part of Ongoing Cyber Investigations"  

SQL Injection protection and detection, SANS GCIH Class

Today was day 4 of the GCIH course being taught by Mark Baggett. Things are going great and I'm learning stuff, I today we discussed SQL injection and cross site scripting.

Regarding prevention, the training it states to perform input checking and disallow/block the user from entering symbols or specials characters such the apostrophe (') or the semi-colon (;) or the percent (%), etc.

Blogging for Information Security

Martin McKeay has an article Write to learn, learn to progress where he talks about his history of blogging and how it has helped his career, this is a very good post with many good points. I've halfheartedly been blogging since 2004 and one thing I've realized is in order to be a good blogger and get "followers" you need to read other peoples blogs and contribute to ongoing "conversations".

Cornerstones of Trust 2011

Yesterday was the 2011 Cornerstones of Trust conference in Foster City, and we had a great turnout. There were 29 sponsor booths from various information security vendors. Four great tracks that were mostly full.

During one of the track session that I attended during the event was the Computer Incident Response Planning session presented by Neal McCarthy.

RSA SecurID data loss breach - opinion update

I am still seeing and hearing a fair amount of tweets and speculation about what the RSA Breach that was announced by Art Coviello, Executive Chairman, RSA.

There seems to be a lot of people worried about this particular breach stating that the RSA SecurID tokens have become "useless" or advocating that you request that RSA replace every one.

Pages

Subscribe to RSS - Information Security