Wednesday, November 22, 2017

Oh $#! : Your website got hacked—now what!?

Oh $#! : Your website got hacked—now what!?: After the initial panic subsides, your mind starts racing and you find yourself asking the question, “What do I (or my IT folks), need to do to get our site back online?” Read on for more…

EU to Declare Cyber-Attacks “Act of War”. USA likely to follow

EU to Declare Cyber-Attacks “Act of War”. USA likely to follow: The framework on a joint EU diplomatic response to malicious cyber activities would seem to raise the stakes significantly on state-sponsored attacks, especially those focused on critical infrastructure.

Tuesday, November 21, 2017

ID card security: Spain is facing chaos over chip crypto flaws | ZDNet

ID card security: Spain is facing chaos over chip crypto flaws | ZDNet: At least the Basque certificate authority Izenpe, which has revoked 30,000 certificates, has given information about how to replace them, the blog added.

Sunday, November 19, 2017

Closing the Cybersecurity Skills Gap With a New Collar Approach

Closing the Cybersecurity Skills Gap With a New Collar Approach: "the well-documented skills shortage in cybersecurity, which is expected to reach 1.5 million unfilled positions by 2020. Closing that gap is daunting, and requires us to find and nurture different types of talent in new ways."



'via Blog this'

It’s time to think differently about cyber security. Here’s how | World Economic Forum

It’s time to think differently about cyber security. Here’s how | World Economic Forum: "The only effective response to this level of cyber attack is a major step up in cyber security to give us national-level insight and oversight that will work closely with industry and government. Those of us with national responsibilities, the leaders of nationally-important businesses, and major institutions, need to unite to fight. We need to lead a defence strategy against this cyber warfare at a national level, bringing the best minds and tools together to protect assets."



'via Blog this'

Resources Courtesy of Regina Lundgren, Writer, Consultant, and Trainer

Resources Courtesy of Regina Lundgren, Writer, Consultant, and Trainer: "For Risk Communication, Public Involvement, and Science and Strategic Communication"



'via Blog this'

Regina Lundgren, Why People Don't Respond

Regina Lundgren, Why People Don't Respond: "You've crafted the perfect message, designed to get people to take notice and take action, safeguarding lives and protecting the environment. Only, that's not what happens. Why?"



'via Blog this'

Art. 17 GDPR – Right to erasure (‘right to be forgotten’) | General Data Protection Regulation (GDPR)

Art. 17 GDPR – Right to erasure (‘right to be forgotten’) | General Data Protection Regulation (GDPR): "The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies:"



'via Blog this'

A Board Member's Top Five Recommendations For Cybersecurity And Risk Management

A Board Member's Top Five Recommendations For Cybersecurity And Risk Management: "top five recommendations for boards to consider in their oversight roles are (1) Double down, or triple down, on the basics; (2) establish a cybersecurity risk policy with clear risk appetite statements; (3) ask for an effective risk report with qualitative assessments and quantitative analytics; (4) provide credible challenge and oversight of the cybersecurity program; and (5) focus on people and culture. "



'via Blog this'

Facts Don't Win Fights: Here’s How to Cut Through Confirmation Bias | Big Think

Facts Don't Win Fights: Here’s How to Cut Through Confirmation Bias | Big Think: "brain imaging and psychological studies are showing that, society wide, we may be on the wrong path by holding evidence up as an Ace card"



'via Blog this'

TP-LINK Archer VR400 Wireless Modem Router - AC 1200, Dual-band | Free Delivery | Currys

Tuesday, November 14, 2017

Research Shows ‘White Male Effect’ Can Impact Risk Communications - ISACA Now

Research Shows ‘White Male Effect’ Can Impact Risk Communications - ISACA Now: I encourage you to read Dan Kahan’s articles on this at CulturalCognition.net, and hope to see more people studying why the advice of information security experts is not universally embraced.

Amazon.com: CUJO Smart Internet Security Firewall

Amazon.com: CUJO Smart Internet Security Firewall with FREE SUBSCRIPTION (2nd Gen.) - Protects Your Network from Viruses and Hacking/ For Home & Business/ Plug Into Your Router: Computers & Accessories: CUJO Protects Your Network from Viruses and Hacking/ For Home & Business/ Plug Into Your Router

IEEE-SA - IEEE Anti-Malware Support Service (AMSS)

IEEE-SA - IEEE Anti-Malware Support Service (AMSS): CMX provides real-time access to information related to clean software files, even prior to the publication of the corresponding software. This can help reduce the number of false positives detected by anti-virus software when more aggressively searching for malware.

Thursday, November 9, 2017

Pacific NW deportations

"It is not the case that immigrants are the only ones applying," said shellfish farmer Marilyn Sheldon. "It is the case that immigrants are the only ones willing to stick it out."

Monday, November 6, 2017

Sunday, November 5, 2017

Why International Cybercrime Is Going To Keep Getting Worse

Why International Cybercrime Is Going To Keep Getting Worse: "The obsessive focus of the leading world governments on cyber offense has produced or inspired a rapidly growing number of highly sophisticated malware that can infect practically any system–from disabling nuclear centrifuges to turning people’s iPhones into all-room listening devices. The best such hacks exploit vulnerabilities unknown even to the makers of the software, known as “zero-day exploits,” are available on the black market."



'via Blog this'

Resources: Center for Risk Management

Resources: Center for Risk Management: "Much of the material presented in this document has been sourced from workshops presented by Dr. Vincent T. Covello, Director of the Center for Risk Communication, New York, N.Y"



'via Blog this'

Reports > Strategic Plan for Risk Communication

Reports > Strategic Plan for Risk Communication: "First, FDA has a long-standing commitment to being science-based and science-led, a commitment that also includes risk communication activities. FDA fully supports using scientific methods to design and assess communications that will ensure maximum effectiveness. The science of risk communication and previous work in this area demonstrate important ground rules.8 For example, it is crucial that the information in a document be both cognitively accessible9 and relevant to the target audience."



'via Blog this'

Friday, October 27, 2017

Change of Address

Change of Address: "Last issued Vehicle or Vessel Registration Card"



'via Blog this'

The Toll Roads

The Toll Roads: Did you recently drive The Toll Roads (State Routes 73, 133, 241, 261)

The Toll Roads

The Toll Roads: Did you recently drive The Toll Roads (State Routes 73, 133, 241, 261)

How does the Keezel work exactly? – keezel

How does the Keezel work exactly? – keezel: "The Keezel sits between your devices and the internet connection you are using so that all the data that's being sent over from your phone, laptop etc to the web only goes through the secure, encrypted tunnel the Keezel created just for you."



'via Blog this'

How to protect your business from the latest cyber attack | WCAI

How to protect your business from the latest cyber attack | WCAI: ""The first line is employee education," said Stephen Cobb, a security researcher at ESET, a security software company. "



'via Blog this'

Wednesday, October 25, 2017

ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki]

ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki]: "The first step is to detect if you use a chip with the vulnerable library. As the vulnerability is present in the on-chip software library and not limited just to a particular batch of hardware, the only reliable way is to generate an RSA keypair on the device and test the public key by the provided tools (see below). "



'via Blog this'

Sunday, October 22, 2017

Friday, October 20, 2017

Rakks Brackets go to Church | Rakks Blog

Rakks Brackets go to Church | Rakks Blog: "Guy Campbell, the owner of Shelf Shop Guy Inc., is an exclusive distributor of Rakks brackets and shelving hardware systems, "



'via Blog this'