Do you use a password? The evolution of online crime is as much about your password strength as it is about your password usage. If you use your strong password for shopping site A and then reuse the password for shopping sites B, C, D, E, F then you are basically saying to yourself – “I trust each of these sites to have the same robust level of security”
Last updated byat .
The following appeared in the Canadian online magazine Security Matters: Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess Everywhere you look, retailers and other entities are offering to collect your data using one of the many location-based services available to collate your whereabouts ...
In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security. Here is the write-up and recap of the event: Talk2Cisco . I took a moment and watched the video, and thought, this is something beneficial to small, medium and large businesses. I also think the ...Tags: christopher burgess, Cisco, Cisco Security, Information Technology, Infosec, security, Social Engineering, social media, Social Network, Talk2CiscoInformation Security, Safety & Security
Five stars to Jakobsson & Ramzan for a most useful guide to understanding the underbelly of the internet. The strength exhibited by this book lies within the all-star lineup of contributors and the thorough dissection of the numerous forms of crimeware. Their book is a must read for anyone who has responsibility or an interest in protecting Personal Identifying Information (PII), Private Consumer Information (PCI) or Intellectual Property (IP).Tags: christopher burgess, Crime, crimeware, cyber secruity, education, Information Technology, Infosec, Intellectual Property, IP, malware, Online crime, online safety, pci, personal identifying information, pii, private consumer information, security, Security Thought Leadership, ThreatNews, Reviews
The guide is a professional guide, with exemplars which can be used in a sandbox, or to assist you in noodling through specific infrastructure monitoring issues – such as “tuning” so the incident logs tell you the story, and don’t drown you in event data. This book should be in every incident responset team’s professional library.Tags: christopher burgess, cyber secruity, incident response, Information Technology, Infosec, infrastructure, monitoring, online security, security, security monitoring, ThreatInformation Security, News, Reviews
In 2008, the publication of Secrets Stolen, Fortunes Lost, proved to be the entree to a great many speaking engagements. Once again, I was invited to NATO’s information assurance conference, and to the AFIO annual intelligence symposium. All in all 2008, saw a diverse and exiciting schedule of events, all of which served to continue ...Tags: AFIO, ASIS, Burton Group, CASP, Crime, FIRST, HTCIA, Information Technology, Infosec, Intellectual Property, ISACA, ISSA, IT Risk, NATO, Risk Management, Secrets Stolen Fortunes Lost, security, Security Awareness, Security Education, Social Engineering, ThreatPresentations
In 2007 I learned much about the concept of “Thought Leadership” and was pleased to have been invited by both public and private entities to speak to their organizations and personnel. Visting Purdue University, Massachusetts for the E-Government Summit, and NATO for their Information Assurance conference, and supporting the HTCIA, ASIS, WRG and AGMA and getting to meet their constituents. I ...Tags: ACT, AGMA, ASIS, CASP, christopher burgess, Crime, HTCIA, Information Technology, Infosec, Intellectual Property, ISACA, ISSA, IT Risk, Massachusetts, NATO, Purdue University, Risk Management, security, Security Awareness, Security Education, Social Engineering, Threat, World Research Group, WRGPresentations