Professor CyberRisk

What is the NIST Cybersecurity Framework

This week we are taking a look at what the NIST Cybersecurity Framework is, what are the pillars of it, and how this is something that could help you be better protected NIST framework: 5 pillars for your cyber security strategy https://www.nist.gov/cyberframework/online-learning/five-functions https://sopa.tulane.edu/blog/NIST-cybersecurity-framework ============== Prefer audio only check out my link on Anchor.FM to get…

Read More

What Are the Stages of a Cyber Attack?

A topic that I teach in my class is what the stages of a cyber attack are. Since we talk about those events all the time here, I thought it a Good Idea to discuss just to level set so everyone is thinking similarly. Even in this discussion, I go over the fact that the…

Read More

FDIC Cyber Rules, Delays in Notifications, and more Energy sector Hacks!

– www.darkreading.com: US Banks Will Be Required to Report Cyberattacks Within 36 Hours – www.scmagazine.com: Months-long hack, theft of Sea Mar healthcare data impacts 688K patients – www.bleepingcomputer.com: Wind turbine giant Vestas’ data compromised in cyberattack Share that link with your friends, or share this one, either helps this podcast grow! Follow me on twitter…

Read More

Congress investigates “Small Lapses”, the FBI was hacked, Another Hospital got hacked, and so did Costco!

– thehill.com: Oversight finds ‘small lapses’ in security led to Colonial Pipeline, JBS hacks – www.fbi.gov: FBI Statement on Incident Involving Fake Emails – krebsonsecurity.com: Hoax Email Blast Abused Poor Coding in FBI Website – www.scmagazine.com: Ohio hospital diverting ambulances, canceling appointments amid cyberattack – www.bleepingcomputer.com: Costco discloses data breach after finding credit card skimmer…

Read More

Professor is Building a CyberSecurity Homelab

This week, is the first in what I hope is at least several episodes in my adventure in building home lab using older hardware, and raspberry pi’s. Kali Linux is the platform from which I will end up doing all of my personal skills training from. ———————————————– https://www.kali.org https://www.kali.org/tools/ ———————————————– Share that link with your…

Read More

Can you be a Ghost on the Internet?

https://apple.news/Ag8RE6-acR1OreRhC8WfDrw Share that link with your friends, or share this one, either helps this podcast grow! Follow me on twitter at: @attiliojr Feeling Generous and want to show your support? algorand: E3HYLC56IHAFXPPA2WZCLBYAVFX42GVFDC7BDAXAQWNI3BXGHF3KDILMSY bitcoin: bc1qls47sszwqxwpad66pn6awxr0ex9s4d33t3t2zw Cosmos: cosmos107ng80lsqhwqxeawajjt6cywmu5nhlt3drvddf BAT: 0x1d17d7Ee7d1BF9F53DEF2CEf4558D05ed9172A86 — This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app —…

Read More

Initial Look at Twitch Data Leak

Episode 64 This week we take an initial look at the Twitch data leak. All 175+ GBs and Over 2Million Files. This is a cursory discussion, and I will not be going into any hyper specific details as I have no interest in helping to damage Twitch. Share that link with your friends, or share…

Read More

Lets Talk Burn Out in the Cybersecurity Industry

Cybersecurity Burnout Statistics: https://www.bitsight.com/blog/5-shocking-it-cybersecurity-burnout-statistics Combating Cyber Burnout: https://www.securew2.com/blog/combating-burnout-in-cybersecurity Hidden Costs: https://www.itsecurityguru.org/2020/05/19/cyber-burnout-the-hidden-cost-of-a-security-career/ How to Avoid: https://cyberwarrior.com/how-to-avoid-cybersecurity-burnout/ ———————————– Share that link with your friends, or share this one, either helps this podcast grow! Follow me on twitter at: @attiliojr Feeling Generous and want to show your support? algorand: E3HYLC56IHAFXPPA2WZCLBYAVFX42GVFDC7BDAXAQWNI3BXGHF3KDILMSY bitcoin: bc1qls47sszwqxwpad66pn6awxr0ex9s4d33t3t2zw Cosmos: cosmos107ng80lsqhwqxeawajjt6cywmu5nhlt3drvddf BAT: 0x1d17d7Ee7d1BF9F53DEF2CEf4558D05ed9172A86 Paypal: https://streamelements.com/professorcyberrisk/tip…

Read More

Ransomware Death, High Treason, Food Cybersecurity, and CISA helps with Insider Threats

– threatpost.com: Baby’s Death Alleged to Be Linked to Ransomware – www.bleepingcomputer.com: CISA releases tool to help orgs fend off insider threat risks https://www.cisa.gov/sites/default/files/publications/IRMPE_Assessment_v1_2021-08-25.pdf – www.bleepingcomputer.com: Russia arrests cybersecurity firm CEO after raiding offices – www.scmagazine.com: Food and agriculture industry needs more threat intel as ransomware attacks crop up Share that link with your friends,…

Read More

Feds go after Cryto Exchange, New Cyber Rules for Insurers, Chinese SmartPhones, and 35 years for DDoS attacks

– www.theregister.com: Suex to be you: Feds sanction cryptocurrency exchange for handling payments from 8+ ransomware variants – thehill.com: Major US port target of attempted cyber attack – www.govtech.com: Wisconsin Law Imposes Cybersecurity Rules for Insurance Industry – arstechnica.com: Security audit raises severe warnings on Chinese smartphone models – www.bleepingcomputer.com: Admin of DDoS service behind…

Read More
WordPress Appliance - Powered by TurnKey Linux