Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
Exfiltration
.
Show all posts
Showing posts with label
Exfiltration
.
Show all posts
February 13, 2018
Cyber Attacks Typology
›
Saw this acronym to describe the types of cyber threats and thought it was useful. STRIDE S poofing - Falsifying identity to gain syst...
November 15, 2016
Why Can't We Keep Our Secrets
›
Well after the now notorious email scandal and other information security mishaps galore, this advertisement in Washington, DC is really q...
October 6, 2016
Preventing Cyber Disaster
›
So I liked this ad from Palo Alto Networks on the side of the bus, over the windows: "Dinosaurs react. Professionals prevent....
August 24, 2015
My Ashley Madison
›
So Ashley Madison is now a well-known adulterous website, particularly after hackers stole 37 million records on the site participants, an...
November 23, 2014
Data 4 Ransom
›
The future of cybercrime will soon become the almost routine taking of your personal and corporate data as hostage. On...
September 1, 2014
You're Probably Not A 10
›
There is a review online for nearly everything...from sources such as Amazon to Yelp, Angie's List, IMDb, and more. But what you ...
March 21, 2014
Safely Detonate That Malware
›
I like the potential of the FireEye Malware Protection System (MPS). Unlike traditional signature-based malware protections like antivi...
March 7, 2014
We're Giving It All Away
›
Nice little video from Mandiant on "The anatomy of a cyber attack." Despite the typical firewalls, antivirus, and intrusion de...
September 28, 2013
Insuring Against Cyber Attacks
›
More and more, our technology is at risk of a cyber attack. In fact, just today the Wall Street Journal reported that Iran has hacke...
›
Home
View web version