Quantcast
Channel: Security Compass » Culture
Browsing all 34 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Women in Tech: Rossana Ludena

Finally: a blog featuring Security Compass’s amazing, vibrant and IT proficient women. I will be writing about who these women really are and how they contribute to Security Compass’s culture, success...

View Article



Image may be NSFW.
Clik here to view.

ALS Ice Bucket Challenge!

Challenge Background The ALS Ice Bucket Challenge first began with a golfer in Florida. He decided to nominate a few friends and soon after Social Media took over. Now at $22 million, the donations...

View Article

Image may be NSFW.
Clik here to view.

Digging and Clicking: How I Learned Lock Picking

 I arrived to work on Monday August 11, 2014 tired from the weekend, a morning I was anything but excited for. Little did I know that within minutes I would be awakened with power. The Hack We had...

View Article

Image may be NSFW.
Clik here to view.

Women in Tech: Sintia Maria Sanches

These blogs are about remarkable employees that contribute to Security Compass’s culture in more ways than one. I will be writing about another fabulous, hard-working woman in tech. This second edition...

View Article

Image may be NSFW.
Clik here to view.

The Escape

The hacker mindset is one of curiosity and intrigue into how systems and various things work. We try to understand how a particular system works and then look for ways that it could be manipulated,...

View Article


Image may be NSFW.
Clik here to view.

Getting Things Done for Geeks

I wrote this post for our internal team and some of my colleagues suggested that it might be useful to others. It’s a bit of a departure from our normal appsec posts. Let us know if you find it useful!...

View Article

Image may be NSFW.
Clik here to view.

NFCVillage: Our NFC threat lab @SCCongress (Photos)

It’s been a busy couple months for us, but all that work led up to a very successful NFCVillage at SC Congress Toronto! I’ll let the pictures do the talking.  Congratulations to our Nexus7 contest...

View Article

Image may be NSFW.
Clik here to view.

Security Training Program – Fixed or Customized?

Let’s assume your market research confirmed the need for a product and you went ahead and developed one. You even have a list of prospective customers who are eager to check out the product before...

View Article


Image may be NSFW.
Clik here to view.

How do I measure the success of my training program?

An information security training program is crucial for ensuring and maintaining a good security posture; in order to effectively manage this program you have to be able to measure it. This article...

View Article


Image may be NSFW.
Clik here to view.

Five ways to secure your Internal network on a low budget

When it comes to network security, we can safely assume that most of the companies make a conscious effort in securing their network perimeter. Modern network security appliances such as firewalls,...

View Article

Image may be NSFW.
Clik here to view.

Software Security is a People Problem

My first professional job was as a software developer.  I had recently graduated with honors with a computer science degree and a software engineering specialization.   In other words, I (supposedly)...

View Article

Image may be NSFW.
Clik here to view.

Cyber-Flood Friday

With a new year in store, the people here at Security Compass thought why not start battle testing your DDoS Mitigation. Given our new offering, we have something else to talk about, which is why we...

View Article

Image may be NSFW.
Clik here to view.

Cyber-Flood Friday

This weeks Cyber-Flood Friday features more about DDoS attacks that occurred throughout the past week, as well as an interesting new platform Facebook has launched. Below I discuss interesting articles...

View Article


Image may be NSFW.
Clik here to view.

Cyber-Flood Friday

This weeks edition of Cyber-Flood Friday features more DDoS news at the realm of the Lizard Squad, as well as an article discussing personal security implications that derives from technology. It is...

View Article

Image may be NSFW.
Clik here to view.

DevOps & Software Security: Turning unplanned work into planned work

Every IT worker I’ve met  has heard me rave about The Phoenix Project. The book uses an all-too-realistic fictional scenario to discuss the behaviors of a high performing IT organization, with a...

View Article


Image may be NSFW.
Clik here to view.

Cyber-Flood Friday

This edition of Cyber-Flood Friday discuss articles that break down Mandiants threat report about cyber-crime trends throughout 2014. It’s cool to see which industries are the largest victims of...

View Article

Image may be NSFW.
Clik here to view.

Cyber-Flood Friday

Welcome back to Cyber-Flood Friday! This week I discuss the evolution of DDoS through 5 methods of growth, as well as myths around how to protect against DDoS attacks. After all the DDoS fun, I discuss...

View Article


Image may be NSFW.
Clik here to view.

Cyber-Flood Friday

Hello and welcome back to Cyber-Flood Friday. This week I discuss a large DDoS attack deployed against the largest feminist blog site out there! Not only do I touch on DDoS but there is also some new...

View Article

Image may be NSFW.
Clik here to view.

Cyber-Flood Friday

It’s that time of the week again! Welcome back to Cyber-Flood Friday, this week I will be discussing some interesting articles I came across over the last few days. As always there is some interesting...

View Article

Image may be NSFW.
Clik here to view.

Cyber-Flood Friday

Welcome back to Cyber-Flood Friday. This week I discuss a major DDoS attack against GitHub an American coding website. The DDoS attacks that were being launched against this site occurred for days, and...

View Article
Browsing all 34 articles
Browse latest View live




Latest Images