Women in Tech: Rossana Ludena
Finally: a blog featuring Security Compass’s amazing, vibrant and IT proficient women. I will be writing about who these women really are and how they contribute to Security Compass’s culture, success...
View ArticleALS Ice Bucket Challenge!
Challenge Background The ALS Ice Bucket Challenge first began with a golfer in Florida. He decided to nominate a few friends and soon after Social Media took over. Now at $22 million, the donations...
View ArticleDigging and Clicking: How I Learned Lock Picking
I arrived to work on Monday August 11, 2014 tired from the weekend, a morning I was anything but excited for. Little did I know that within minutes I would be awakened with power. The Hack We had...
View ArticleWomen in Tech: Sintia Maria Sanches
These blogs are about remarkable employees that contribute to Security Compass’s culture in more ways than one. I will be writing about another fabulous, hard-working woman in tech. This second edition...
View ArticleThe Escape
The hacker mindset is one of curiosity and intrigue into how systems and various things work. We try to understand how a particular system works and then look for ways that it could be manipulated,...
View ArticleGetting Things Done for Geeks
I wrote this post for our internal team and some of my colleagues suggested that it might be useful to others. It’s a bit of a departure from our normal appsec posts. Let us know if you find it useful!...
View ArticleNFCVillage: Our NFC threat lab @SCCongress (Photos)
It’s been a busy couple months for us, but all that work led up to a very successful NFCVillage at SC Congress Toronto! I’ll let the pictures do the talking. Congratulations to our Nexus7 contest...
View ArticleSecurity Training Program – Fixed or Customized?
Let’s assume your market research confirmed the need for a product and you went ahead and developed one. You even have a list of prospective customers who are eager to check out the product before...
View ArticleHow do I measure the success of my training program?
An information security training program is crucial for ensuring and maintaining a good security posture; in order to effectively manage this program you have to be able to measure it. This article...
View ArticleFive ways to secure your Internal network on a low budget
When it comes to network security, we can safely assume that most of the companies make a conscious effort in securing their network perimeter. Modern network security appliances such as firewalls,...
View ArticleSoftware Security is a People Problem
My first professional job was as a software developer. I had recently graduated with honors with a computer science degree and a software engineering specialization. In other words, I (supposedly)...
View ArticleCyber-Flood Friday
With a new year in store, the people here at Security Compass thought why not start battle testing your DDoS Mitigation. Given our new offering, we have something else to talk about, which is why we...
View ArticleCyber-Flood Friday
This weeks Cyber-Flood Friday features more about DDoS attacks that occurred throughout the past week, as well as an interesting new platform Facebook has launched. Below I discuss interesting articles...
View ArticleCyber-Flood Friday
This weeks edition of Cyber-Flood Friday features more DDoS news at the realm of the Lizard Squad, as well as an article discussing personal security implications that derives from technology. It is...
View ArticleDevOps & Software Security: Turning unplanned work into planned work
Every IT worker I’ve met has heard me rave about The Phoenix Project. The book uses an all-too-realistic fictional scenario to discuss the behaviors of a high performing IT organization, with a...
View ArticleCyber-Flood Friday
This edition of Cyber-Flood Friday discuss articles that break down Mandiants threat report about cyber-crime trends throughout 2014. It’s cool to see which industries are the largest victims of...
View ArticleCyber-Flood Friday
Welcome back to Cyber-Flood Friday! This week I discuss the evolution of DDoS through 5 methods of growth, as well as myths around how to protect against DDoS attacks. After all the DDoS fun, I discuss...
View ArticleCyber-Flood Friday
Hello and welcome back to Cyber-Flood Friday. This week I discuss a large DDoS attack deployed against the largest feminist blog site out there! Not only do I touch on DDoS but there is also some new...
View ArticleCyber-Flood Friday
It’s that time of the week again! Welcome back to Cyber-Flood Friday, this week I will be discussing some interesting articles I came across over the last few days. As always there is some interesting...
View ArticleCyber-Flood Friday
Welcome back to Cyber-Flood Friday. This week I discuss a major DDoS attack against GitHub an American coding website. The DDoS attacks that were being launched against this site occurred for days, and...
View Article
More Pages to Explore .....