Nov 26, 2018 | Podcast, Uncategorized
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreIntelligence gathering is normal security work. Intelligence gathering for the purposes of revealing someone's identity when they...
Nov 19, 2018 | Podcast, Uncategorized
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreThe Debt has Interest and the Interest MUST be Paid! Show...
Nov 15, 2018 | Audit, Compliance, Information Security, NIST 800-53
Author: Kristof Holm I often hear feedback from clients that National Institute of Standards and Technology (NIST) frameworks are too cumbersome and frustrating to implement, with a steep learning curve to understand all the requirements. I can empathize with them,...
Nov 12, 2018 | Podcast, Uncategorized
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreEvery industry has a regular type. Show Notes: https://justinfimlaid.com/3-parts-of-your-vendor-security-assessment-program/...
Nov 5, 2018 | Podcast, Uncategorized
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | More3 Parts of your Vendor Security Assessment Program Show...
Nov 1, 2018 | Penetration Testing
By: Eric Kobelski As a software developer turned security engineer, I continue to follow current development technologies, as it makes me more of an effective tester. One of the articles that I was reading contained an interview with one of the applications developers...