This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

2016 Ultimate IT Security Kit (over $25 value!) FREE for a limited time

The following is external content provided as a free resource for blog readers.
The threat of hacking may be the most damaging on the internet. Technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don't protect it. Use this knowledge to protect yourself and your business, today!

The following kit contents will help you continue your research on Security:
  • Mobile Security: How to Secure, Privatize, and Recover Your Devices
  • 4 Best Practices for Monitoring Cloud Infrastructure You Don't Own
  • 3 Things Network Teams Need to Know
  • Top Tips for Securing Big Data Environments


Request Free!

Mobile Security: How to Secure, Privatize, and Recover Your Devices (a $26.99 value) FREE for a limited time

The following is external content provided as a free resource for blog readers.

In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.

What You Will Learn

  • Discover how mobile devices are monitored
  • Identify threats to you, and your family's privacy
  • Ensure the safety of your device and identity
  • Recover from being hacked
  • Deal with a compromised or lost device
  • Learn in detail about device support and insurance in detail


Request Free!

Penetration Testing Methodologies Training Course (a $99 value!) FREE

The following is external content provided as a free resource for blog readers.
In this course we'll explain the types of pen–testing techniques being used and how to build a complete Penetration Testing Strategy. If you are looking to become a professional pen–tester or build a penetration testing team, this course is a great start!
  • Learn Penetration Testing Techniques with 13 classes, 2 hours of content, and quizzes to test your skills
  • Pen-Testing Methodologies List
  • The difference between Blue Teaming and Red Teaming
  • Hiring and Profiling a Pen-Tester
  • ROI of Pen-Testing
  • Pen-Testing vs. Vulnerability Testing


Request Free!

Space Weather Outlook April 25, 2016 at 01:50AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-17 2016 April 24 at 11:36 p.m. MDT (2016 April 25 0536 UTC) **** SPACE WEATHER OUTLOOK **** Summary For April 18-24 Category R2 (Strong) radio blackouts were observed on 18 April due to flare activity from active sunspot Region 2529. Category G1 (Minor) geomagnetic storms were observed on 23 April due to coronal hole high speed stream effects. Outlook For April 25-May 1 A chance for G1 (Minor) geomagnetic storms exists on 03 April due to anticipated coronal hole high speed stream effects. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

2016 Cyberthreat Defense Report

The following is external content provided as a free resource for blog readers.
Based on a rigorous survey of IT security decision makers and practitioners – across not only North America and Europe, but for the first time, in Asia Pacific and Latin America as well – the Cyberthreat Defense Report examines the current and planned deployment of countermeasures against the backdrop of numerous perceptions, such as:
  • The adequacy of existing cybersecurity investments, both overall and within specific domains of IT
  • The likelihood of being compromised by a successful cyberattack
  • The types of cyberthreats that pose the greatest risk to the organization
  • The organizational factors that present the most significant barriers to establishing effective cyberthreat defenses
  • The operational, tactical, and strategic value that individual security technologies provide


Request Free!

Testing and Debugging Distributed Applications

The following is external content provided as a free resource for blog readers.

The challenge with distributed applications is that most of the tools and packages that we can use for single-process applications lose much of their power when dealing with multiple processes, especially when these processes run on different computers.

Debugging and profiling distributed applications written in C, C++, and Fortran can be done with tools such as Intel VTune, Allinea MAP, and DDT. Unfortunately, Python developers are left with very few or no options for the time being.  Learn more about these challenges in this guide: Testing and Debugging Distributed Applications



Request Free!

Space Weather Outlook April 17, 2016 at 11:51PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-16 2016 April 17 at 9:37 p.m. MDT (2016 April 18 0337 UTC) **** SPACE WEATHER OUTLOOK **** Summary For April 11-17 Category G1 (Minor) geomagnetic storms were observed on 12-14 April due to effects from a negative polarity coronal hole high speed stream. Outlook For April 18-24 Category R1-R2 (Minor-Moderate) radio blackouts are possible on 18-19 April as active Region 2529 approaches and exits the west limb. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Office 365 Enterprise Guided Tour

The following is external content provided as a free resource for blog readers.
It's a quick and easy way to test drive new enterprise capabilities, including: advanced collaboration, analytics, and security features.
  • Step through common enterprise scenarios to see how Office 365 can support your business needs
  • See the latest in-product experience with the most up-to-date versions of the Office applications you use every day as well as the new advanced features
  • Explore the top features and advanced capabilities available for email and calendar management, collaborative meetings, analytics, and security


Request Free!

Point of Sale and ATMs: Your Data at Risk

One of the topics I'm going to be covering in my upcoming book "Death by Identity Theft" is how industry's lack of regard for security has significant impacts for consumers.

One of the most important lessons I try to teach any newcomer to Cyber Security is that compliance does not mean security. In fact, compliance often creates a false sense of security.

Major retailers recently hit by point of sale malware were PCI compliant. This means their systems met payment card industry standards for security. And yet, their point of sale systems were still compromised by malware, putting customers' personal information at risk. I previously covered this problems with PCI compliance.

Unfortunately, even though most consumers have now been issued EMV chip credit cards, many businesses still aren't ready to accept them, and those that do are only requiring signatures, not PINs.

Oh, and did I mention that 95% of the world's ATMs are still running Windows XP?

These are just a few examples of problems consumers face when trying to protect themselves from identity theft or credit card fraud.

If you haven't signed up for identity theft protection, now would be a good time.

Space Weather Outlook April 11, 2016 at 01:00AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-15 2016 April 10 at 10:44 p.m. MDT (2016 April 11 0444 UTC) **** SPACE WEATHER OUTLOOK **** Summary For April 4-10 G1 (Minor) geomagnetic storm levels were observed on 07-08 April due to activity associated with a solar sector boundary crossing as well as a prolonged period of southward Bz component of the interplanetary magnetic field. No radio blackouts or solar radiation storms were observed. Outlook For April 11-17 G1 (Minor) geomagnetic storm levels are likely on 13-14 April due activity associated with a recurrent negative polarity coronal hole high speed stream. No radio blackouts or solar radiation storms are expected. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Securing the C-suite: Cybersecurity Perspectives From The Boardroom and C-suite

The following is external content provided as a free resource for blog readers.
Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished

Request Free!

Kali 101 - FREE Video Training Course (a $19 value!)

The following is external content provided as a free resource for blog readers.
Kali is a penetration testing Linux distribution created by the Offensive Security. It holds a repository of multiple tools for security related engineers including hacking wireless networks, web applications, databases, reverse engineering, password crackers, and much more! So as you can see, Kali is a versatile and powerful tool for anyone looking to do any cyber security related work.

As indicated by the ‘101' in the course title, this course is a beginner's guide to getting started in Kali…to get your feet wet. The course is broken down into 3 sections; Getting Started, Basic Configuration, and Tools overview. We first give you an overview of Kali and its use cases then offer a step-by-step walkthrough of installing Kali using VMware. Next we teach you some important configuration settings in the distribution including configuring your network and managing services in Kali. Knowing these procedures will help you setup the proper environments when using Kali and its tools. Finally we go over the top tools in Kali and describe their features.

This course will take you 56 minutes to complete.

Request Free!

Health Management Technology

The following is external content provided as a free resource for blog readers.
As the first publication dedicated to the healthcare IT market in 1980, Health Management Technology continues to deliver real-world solutions, news, and product trends, including regulatory compliancy, electronic medical records, wireless systems, revenue management, clinical information systems, data security and storage, scheduling, and more. Subscribers include senior C-suite executives and IT managers in hospitals and healthcare organizations, integrated delivery networks, managed care organizations and health plans, physician's practices, and IPAs. Health Management Technology is a multimedia resource comprised of a monthly print magazine and digital edition, daily e-newsletters, monthly product spotlights, and a comprehensive website.

Request Free!

Making Security Technology Work for your Facility

The following is external content provided as a free resource for blog readers.
Whether it's worrying about a possible break-in or an employee theft, protecting your business is always a concern. For busy warehouses and manufacturing companies, the worry is even greater, as time lost to responding to a crime means revenue loss. With expensive inventory, an active production site, and workers entering and leaving around the clock, reliable security is a must.

Request Free!

Video Security Goes To The Cloud

The following is external content provided as a free resource for blog readers.
The cloud is no longer just for deploying software – it's now transforming the way companies physically secure their business. Not only does it reinforce cutting-edge technology to stay ahead of criminals, it also reduces the total cost of managing physical security. Taking advantage of the cloud can empower security professionals to focus on actual security issues rather than maintaining and supporting technology. Learn how you can heighten operational efficiency and future-proof your business with the cloud.

Request Free!

SANS: Using Analytics to Predict Future Attacks and Breaches

The following is external content provided as a free resource for blog readers.
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target – and likely already is. In the past, cybersecurity tools and processes have focused more on prevention than on quick detection and rapid response. But organizations often don't find indicators of compromise soon enough, nor are they responding to these incidents and removing them quickly enough. They also need the capability to predict future trends based on past and current behavior, and that's where security analytics may prove most useful.

Request Free!

How to Transform Employee Worst Practices Into Enterprise Best Practices

The following is external content provided as a free resource for blog readers.
Despite all the funds you may have spent on state-of-the-art security software, the bad guys are just one gullible user click away from staging an all-out invasion.

Such incidents are skyrocketing. According to a recent study by Osterman Research, email is the most prevalent channel of infiltration into the enterprise.

This white paper provides clear direction on how to go about improving your organization's security posture by “inoculating” employees who fall for social engineering attacks.

Download Now!

Request Free!

Space Weather Outlook April 03, 2016 at 11:51PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-14 2016 April 3 at 9:37 p.m. MDT (2016 April 4 0337 UTC) **** SPACE WEATHER OUTLOOK **** Summary For March 28-April 3 G1 (Minor) and G2 (Moderate) geomagnetic storm levels were observed on 02 April due to effects from a recurrent, negative polarity coronal hole high speed stream. Outlook For April 4-10 No space weather storms are predicted for the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Apache Spark and MongoDB - Turning Analytics into Real-Time Action

The following is external content provided as a free resource for blog readers.
Apache Spark is one of the fastest growing big data projects in the history of the Apache Software Foundation. With its memory-oriented architecture, flexible processing libraries and ease-of-use, Spark has emerged as a leading distributed computing framework for real-time analytics.

Combining the leading analytics processing engine with the fastest-growing database enables organizations to operationalize sophisticated, real-time analytics. Spark jobs can be executed directly against operational data managed by MongoDB without the time and expense of ETL processes. MongoDB can then efficiently index and serve analytics results back into live, operational processes.

Request Free!

Campus Safety: Access Control and Visitor Management Systems are Vital

The following is external content provided as a free resource for blog readers.
Allowing access to those who belong on campus, while keeping out sexual predators, thieves and vandals is a challenge facing virtually every principal, superintendent, board member and school resource officer. But with thorough planning and the help of basic access control measures as well as innovative technologies, a more secure campus can be achieved.

Request Free!