recentpopularlog in

csrollyson : security   264

« earlier  
PCI Managed Services – A New Approach to PCI Compliance from Stickman | Stickman
Useful post references 12 #PCI #compliance requirements and details #security firm's remediation procedures (mitigate funky formatting by shrinking font size) #technical #writing
PCI  compliance  technical  writing  csr19  howto  framework  remediation  reference  approach  credit  card  data  security 
5 weeks ago by csrollyson
Payment Card Industry Data Security Standard - Wikipedia
Good start point to understand PCI compliance: history, requirements, compliance levels, validation, etc.
compliance  standard  payment  credit  card  reference  csr19  security 
7 weeks ago by csrollyson
Who’s Behind the Attacks in Sri Lanka?
Useful background for understanding terror attacks in SriLanka
srilanka  analysis  imterview  Q2  2019  rift  prime  minister  president  police  coup  security  asia  terror  attack  hotel  church 
april 2019 by csrollyson
Opinion: We have a common responsibility to fight anti-refugee rhetoric - UNHCR Canada
Powerful story of healing. #Canada host of #Vietnamese #refugee now sponsoring #Syrian refugee. Rare story of empathy for fear-driven suspicion of refugees
19eyz  bullsi  refugee  canada  pointofview  exceptional  story  vietnam  syria  empathy  politics  fear  security  job  host  relationship  economy  community 
march 2019 by csrollyson
Early History of the Kryptonite Bicycle Lock
The origins and early history of the Kryptonite lock, up until the K4
cycling  history  lock  security  company  invention  mechanic  design  photo  founder  1987 
february 2019 by csrollyson
Survival of the Richest – Future Human – Medium
Sobering must-read: insight into fabulously wealthy hightech investor fears—and what they mean to you and me
hightech  billionaire  fear  security  apocalypse  climate  change  environment  professor  Q3  2018  csrblogcomment  imsight  reflection 
july 2018 by csrollyson
How Israel Caught Russian Hackers Scouring the World for U.S. Secrets - The New York Times
Israeli hacking team discovers Russia hackers’ use of Kaspersky antivirus software to steal USA agency secrets: antivirus software “the perfect tool”
hacker  team  israel  computer  security  antivirus  backdoor  usa  spy  agency  cia  nsa  fbi  russia  2017  q3  espionage  expose 
may 2018 by csrollyson
Don’t let Brexit undermine Ireland’s peace | Hillary Clinton | Opinion | The Guardian
Hillary Clinton remembers the importance of women in nogitiating the Good Friday Agreement
ireland  brexit  border  pointofview  clinton  history  women  politics  poverty  security  civil  war  terror 
april 2018 by csrollyson
Sex workers fear violence as US cracks down on online ads: 'Girls will die' | US news | The Guardian
Legislation shuts websites that let sex workers screen and verify clients, sex work just got much more dangerous
sexuality  prostitution  Q2  2018  news  legislation  craigslist  backpage  social  network  usa  security  website 
april 2018 by csrollyson
SWITCHED SOURCE
Software helps power utilities w #grid #management amid #climate #change disruption #hacking & other risks
electric  power  grid  technology  management  distribution  software  compatibility  security  load  brownout  risk  detroit 
february 2018 by csrollyson
What Went Wrong In Hawaii, Human Error? Nope, Bad Design
Superb: deconstructing faulty design behind the error producing the Hawaii missile panic
hawaii  false  alarm  missile  Q1  2018  design  system  analysis  example  exceptional  howto  human  factors  centered  menu  interface  security 
january 2018 by csrollyson
Moving to HTTPS on WordPress | CSS-Tricks
Some good advice for repairing links after transitioning to https
SSL  wordpress  howto  security  administration 
december 2017 by csrollyson
In-Depth HTTP to HTTPS Migration Guide for WordPress
Excellent step by step guide to transitioning your site to https
wordpress  administration  security  howto  guide  migration 
december 2017 by csrollyson
Russia's Cyberwar on Ukraine Is a Blueprint For What's to Come | WIRED
MUSTread: Cyberspace is not a target, it's a medium to attack critical infrastructure of whole countries
cyber  war  russia  ukraine  usa  story  example  2017  Q2  hack  power  electric  grid  election  attack  security  military  malware  howto  railroad  alabama  Sandworm  poland  government  pension  defense  crashoverride  utility 
october 2017 by csrollyson
Inside an Epic Hotel Room Hacking Spree | WIRED
Fascinating long story of open source #hotel #key #hack
hotel  hospitality  hack  story  key  security  drug  addiction  arizona  jail  open  source 
august 2017 by csrollyson
Myspace Security Flaw Let Anyone Take Over Any Account Just By Knowing Their Birthday | WIRED
How #MySpace #breach enabled easy account
takeovers (check your acct, change pw)
myspace  breach  Q3  2017  hack  security  social  network 
july 2017 by csrollyson
Hackers Came, but the French Were Prepared - The New York Times
How the Macron campaign fought off the #russia election #cyber #attack
france  election  attack  hack  russia  putin  analysis  q2  2017  cyber  macron  phishing  computer  politics  security 
may 2017 by csrollyson
Cyber Terrorism - How Real is the Threat?
Broad introduction to #cyber #war and civilian targets #IoT a major threat
cyber  war  civilian  IoT  target  q2  2016  security  terrorism 
march 2017 by csrollyson
In-Depth Analysis of a Criminal Organization Targeting WordPress Websites
Excellent: brief analysis of criminal org attacking #wordpress sites to sell counterfeit sport apparel
criminal  counterfeit  sport  apparel  analysis  q1  2017  ukraine  china  spam  malware  wordpress  attack  security  host  website  example  ecommerce  copyright 
march 2017 by csrollyson
The principles of trust and evolution of trust: PwC
A management consulting view of #trust in #business emphasizes #hightech, #economy
pwc  trust  management  consulting  economy  politics  q1  2017  hightech  security 
march 2017 by csrollyson
Wired - October 2016 by min-mag.com - issuu
@Google #jigsaw: Tries to protect people against cyber bullying [but nuance is everything, machines need work]
google  digital  twitter  bully  politics  thug  russia  intimidation  internet  cyber  jigsaw  privacy  security 
january 2017 by csrollyson
IoT Platforms: Exploring 10 Dimensions of the IoT Technology Stack
Useful discussion of the components of #IoT #infrastructure and other components
iot  stack  network  application  adoption  howto  security  model  device  integration  2cdo  cdo  2csra  2snr 
september 2016 by csrollyson
Articles | AFP
Not a pretty picture: #HCI/human factors meets #security & systems/policies very hard to use
human  centered  design  security  interview  password  fsi  engineering  social  media  Q3  2016  organization  change  I.T.  policy  hospital  example  workaround  2ghcj  2csrollyson  2snr  2cdo  cco  behavior  economics 
august 2016 by csrollyson
A New Wireless Hack Can Unlock 100 Million Volkswagens | WIRED
Oops! Millions #VW #Skoda #Audi vehicles worldwide exposed
To keyless entry, theft #connected #car
automotive  security  hack  Q3  2016  vw  key  theft  audi  skoda  global  radio  iot  smart  connected  car  snafu  2csra  2ghcj  2cdo  2execguide 
august 2016 by csrollyson
A Letter From G.O.P. National Security Officials Opposing Donald Trump - The New York Times
50 #national #security officials warn: #Trump "would be the most reckless President in American history"
usa  politics  president  election  trump  security  military  q3  2016  republican  state  department  international  global  NATO  2ghcj  2csrollyson 
august 2016 by csrollyson
Israel Cyber Security Showcase - June 28
Superb presos by #Israel startups featuring commercialized military grade software & solutions
israel  security  hack  panel  chicago  2016  Q3  military  technology  commercialization  startup 
july 2016 by csrollyson
Clever Attack Uses the Sound of a Computer’s Fan to Steal Data | WIRED
Research: ingenious hacking method on #military & air-gapped systems cyber security
security  hacker  research  Q2  2016  israel  military  malware  airgap  attack  ciso  cio  2csra  2snr 
june 2016 by csrollyson
What the Mark Zuckerberg Hack Means for the State of Cybersecurity | ZeroFOX
How #password #reuse adds value to #SocialMedia #hacks & dark market pricing; What to do #security
social  media  security  Q2  2016  facebook  twitter  linkedin  pinterest  instagram  news  zuckerberg  password  hack  Enterprise  howto  reuse  engineering  2csrollyson 
june 2016 by csrollyson
Wordfence Forensic Team and Site Cleaning Officially Launches - Wordfence
PSA> Have you been #hacked? Simple service gets you clean, online & prevention #kudos #wordpress (I'm a client)
wordpress  security  hack  service  launch  q2  2016  exceptional  remedy  clean  prevention  2snr  2csra  2csrollyson  malware  server  analysis  code 
june 2016 by csrollyson
Flash From The Past: LinkedIn Hacked | ZeroFOX
PSA: the new #LinkedIn #hack, what you need to know (plz share) #security
linkedin  Q2  2016  hack  security  dark  web  history  2012  password  login  howto  cyber  crime  2execguide  facebook  social  network 
may 2016 by csrollyson
Global Surveillance Law Security Comparison Tool
Useful tool globally compares surveillance law by jurisdiction/type/topic
law  legal  tool  surveillance  global  comparison  website  country  security  government  2ghcj  2csrollyson  2csra  2cdo  2snr 
april 2016 by csrollyson
Panama Papers: Email Hackable via WordPress, Docs Hackable via Drupal - Wordfence
Analysis of #PanamaPapers #hack: How attacker entered #LawFirm #WordPress > #email > #enterprise documents
wordpress  panama  papers  Q2  2016  security  hack  analysis  casestudy  law  professional  services  firm  email  credential  login  plugin  database  drupal  2snr  2csra  2ghcj  2sbs  2cdo 
april 2016 by csrollyson
Responsibility for Vehicle Security and Driver Privacy in the Age of the Connected Car
Analyst @IDC on #privacy, #security, #safety issues with #connected #autonomous car that dampen adoption
connected  car  autonomous  report  security  privacy  idc  Q1  2016  safety  smartphone  assistance  liability  reference  friction  adoption  fear  2cdo  2csra 
april 2016 by csrollyson
How Attackers Gain Access to WordPress Sites - Wordfence
MUSTread if you host #WordPress instances/sites: Attacker stats + how-to checklist for keeping secure
wordpress  security  survey  Statistics  q1  2016  howto  guide  plugin  bruteforce  blog  software  platform  website  malware  phishing  hack  theme  hosting  exceptional  list  2csra  2execguide  2sbs  2eglii  2snr 
march 2016 by csrollyson
Fake Frappa-Photos: The Great Coffee Instagram Scam
Helpful glimpse into #Instagram scams, yep, it's the latest darling of malware distributors #kudos
instagram  q1  2016  scam  malware  security  starbucks  example  photo  social  media  criminal  2execguide 
march 2016 by csrollyson
Apple is right not to break its own encryption! And not just for the obvious reasons...
EXCELLENT: Concise post on the real threat behind well-meaning govt request to break into iPhones #nobackdoor
privacy  security  backdoor  q1  2016  terrorism  government  exceptional  apple  ios  encryption 
february 2016 by csrollyson
Political Correctness Is Dying, Even in France | PJ Media
France minister quits over crackdown on naturalized citizens; shift in poltical correctness?
pointofview  france  immigrant  government  q1  2016  speculation  colony  security  terrorism  politics  guilt  slave  2ghcj 
february 2016 by csrollyson
Social Media Security Blog | ZeroFOX
Great security blog, tons of useful info & reports featuring #social #media, #engineering
security  phishing  malware  blog  howto  cdo  cco  reference  research  global  virus  clickbait  social  media  engineering  2csra 
january 2016 by csrollyson
The battle to bring your own app - CIO
Useful primer on #BYOA (Bring Your Own Application), totally enabled by #cloud
BYOA  CIO  q1  2015  consumerization  enterprise  cloud  IT  policy  governance  security  productivity  2csra  2snr  2sbs 
december 2015 by csrollyson
How the NSA uses behavior analytics to detect threats | CIO
NSA #cloud #security follows #amazon practices, adds proprietary #behavior #analytics to detect exceptions
government  security  cloud  q4  2015  nsa  survelllance  internal  external  behavior  analytics  big  data  clearance  permission  cio  interview  2cdo  2csra 
december 2015 by csrollyson
What You Need to Know to Be Culturally Literate in 2016 | WIRED
Emerging trends in science, design, business, security & culture + links to posts #kudos
report  reference  2015  Q3  science  design  business  security  culture  usa  pioneer 
november 2015 by csrollyson
Ten Ways To Improve The Customer Experience Of Air Travel - Forbes
Horrible #CX flying @united fr Mumbai>NJ + suggests to improve #customer #experience
airline  customer  Experience  Q4  2015  list  india  united  class  food  airport  security  service  experiential  delay  flight  attendant  alienation  travel  2cdo  2ghcj 
october 2015 by csrollyson
Five Best File Encryption Tools
Compares the best encryption software as of Q1 2015
encryption  disk  tool  software  comparison  q1  2015  security 
september 2015 by csrollyson
For discerning hackers, malware is so last year | InfoWorld
Grim & predictable: Hackers #social #engineer into corp systems using legit creds, leave few tracks
security  Enterprise  malware  Q3  2015  social  engineering  intrusion  breach  hack  theft  phish  2ghcj  2csra  2cdo 
september 2015 by csrollyson
Did Lenovo install malware on laptops?
Scandalous: #Lenovo installs malware on machines to serve ads, opens malware exploit
chrome  lenovo  malware  security  policy  Q1  2015  scandal  laptop  web  bank  SSL  compromise  2snr  2sbs 
february 2015 by csrollyson
This Is What Your Face Looks Like to Facebook — Matter — Medium
FACEbook indeed: MUSTsee graphical depiction of how human faces "look" to face recognition algorithms
big  data  facebook  face  recognition  video  Algorithm  photo  composite  security  camera  Platform 
november 2014 by csrollyson
Here’s Why Public Wifi is a Public Health Hazard — Matter — Medium
(White) hacking case study: shows various hacker tools that steal phone, tablet & laptop data, creds, bank acct info, control of machine
wifi  wireless  network  security  hack  exposé  casestudy  amsterdam  cafe  public 
october 2014 by csrollyson
What the Elizabethans Teach us About Cyber-Security - The Analogies Project
Fascinating example of secret messaging and espionage + parallels to cyber security & hacking #Kudos #fb
history  security  england  example  elizabeth  mary  scotland  france  spain  espionage  spy  agent  message  plot  treason  cyber  diligence  training  tudor  government  exceptional 
september 2014 by csrollyson
« earlier      
per page:    204080120160

Copy this bookmark:





to read