tag:blogger.com,1999:blog-10925891914571888362024-03-13T05:20:37.602-04:00Kellep Charles Information Security Blog SpaceThis Information Security blog is about my views and experiences in the information security, computer forensics and incident response industry as a student, professional and educator.Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.comBlogger736125tag:blogger.com,1999:blog-1092589191457188836.post-87469706369719858902018-10-30T17:56:00.003-04:002018-10-30T17:56:23.213-04:00Attack Overview - VideoThere are generally two reasons an individual or an organization is attacked. One, you are specifically targeted or two, you are a target of opportunity.<br />
Any good hacker will take a few common steps to attack a site these can generally be ordered from 1-4.<br />
<ol>
<li>Reconnaissance</li>
<li>Scanning</li>
<li>Research Vulnerabilities</li>
<li>Performing the attack</li>
</ol>
See the video here - <a href="https://www.securityorb.com/general-security/attack-overview-video/">https://www.securityorb.com/general-security/attack-overview-video/</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-89072873218929299272018-10-30T16:38:00.002-04:002018-10-30T16:38:55.162-04:00The SecurityOrb Show - An Interview with Haiti CyberCon Co-Founder Michel Arbrouet<a href="https://www.securityorb.com/wp-content/uploads/2018/10/cybercon-logo_rvbsmall.png" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="" class="alignright wp-image-10105 " height="84" src="https://www.securityorb.com/wp-content/uploads/2018/10/cybercon-logo_rvbsmall.png" width="94" /></a>HaitiCyberCon is an InfoSec/Hacker conference for professionals and enthusiasts alike located in Haiti, offering training as well interesting and inventive talks and workshops. We had the opportunity to speak with <a href="https://www.haiticybercon.com/speaker/mike-arbrouet/">MICHEL ARBROUET</a>, the co-founder of the conference about the event, the goal of the event and some other interesting topics.<br />
<br />
Listen to the interview here - <a href="https://www.securityorb.com/conference/the-securityorb-show-an-interview-with-haiti-cybercon-co-founder-michel-arbrouet/">https://www.securityorb.com/conference/the-securityorb-show-an-interview-with-haiti-cybercon-co-founder-michel-arbrouet/</a><br />
<br />Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-31589747410602961702018-10-29T11:08:00.003-04:002018-10-29T11:08:47.120-04:00A Book Review of “Learning Malware Analysis” by Monnappa KAIn my latest book review, I took on the topic of malware analysis which is not often covered in security books or training centers. In 2018, Packt Publishing released “Learning Malware Analysis” by Monnappa KA. Monnappa works for Cisco Systems as an information security investigator focusing on threat intelligence and the investigation of advanced cyber-attacks, he is also a member of the Black Hat review board.<br />
<br />
I found “Learning Malware Analysis” to be very informative, easy to read as well as follow, moreover I found the examples in the book easy to replicate which was priceless. Many times in the examples associated with books, the labs never quit work out as stated and you are left trying to figure out that went wrong. When Monnappa introduced a concept, he would define it and follow it up with an example or analogy to help the reader obtain a stronger comprehension. If fact, throughout the whole book, he would end a paragraph, concept or idea with the term “for example” or “for instance”. This was something I appreciated very much as some of the concepts can be uncharted territory even for the seasoned security practitioner.<br />
<br />
Read more here - <a href="https://www.securityorb.com/featured/a-book-review-of-learning-malware-analysis-by-monnappa-ka/">https://www.securityorb.com/featured/a-book-review-of-learning-malware-analysis-by-monnappa-ka/</a><br />
<br />Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-30098508679965419932018-10-29T10:09:00.003-04:002018-10-29T10:09:32.719-04:00A Book Review of “Pentesting Azure Applications” by Matt BurroughIn this book review, I looked at the topic of pentesting cloud-based applications, specifically Microsoft’s Azure. While the focus of the book was for Azure, a lot of the information will be beneficial no matter the cloud environment. Even thought Cloud hosting has been around for several years, it is still a new technology and many senior security professionals are learning the do and don’ts of how to secure the infrastructure.<br />
<br />
I found “Pentesting Azure Applications” to be informative and Matt does a great job of sharing links to additional information on topics that can help secure your Azure deployment(s). In this aspect, while this book is meant to be used for pentesting Azure, it is also a great resource in securing and locking down your subscription. Just by looking at and using the “Defender’s Tips” that Matt includes, you will definitely make your network and systems more secure.<br />
<br />
The text consists of 8 chapters, each chapter stands by itself and there is no need to read chapters 1 thru 7, if you are looking to understand logging and alerting in chapter 8. Below is a breakdown of each chapter and what can be found in each. Since the book can be used for all levels of security testers, you may find that some chapters are more useful than others. A lot of large pentesting firms have a team that handles the preparation and legal aspects for multiple teams, and you may want to jump straight to reconnaissance or network investigations chapters.<br />
Read more here - <a href="https://www.securityorb.com/cloud-security/a-book-review-of-pentesting-azure-applications-by-matt-burrough/">https://www.securityorb.com/cloud-security/a-book-review-of-pentesting-azure-applications-by-matt-burrough/</a><br />
Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-48398408452991821092018-09-14T11:20:00.002-04:002018-09-14T11:20:39.048-04:00Cyberwar Season 1 – Episode 3: Cyber Mercenaries
<br />
<div class="MsoNormal">
Cyberwar Season 1 – Episode 3: Cyber Mercenaries - <a href="https://www.securityorb.com/featured/cyberwar-season-1-episode-3-cyber-mercenaries/">https://www.securityorb.com/featured/cyberwar-season-1-episode-3-cyber-mercenaries/</a></div>
<div class="MsoNormal">
<br /></div>
Authoritarian regimes are using spyware tools bought from private companies
in the West. Hacker PhineasFisher targeted these companies to reveal their
deals to suppress dissent.<br />
Hey everyone I am on the third episode of “Cyberwar” hosted by Ben Makuch
(@BMakuch) a national security reporter that travels the world to meet with
hackers, government officials, and dissidents to investigate the ecosystem of
cyberwarfare. They have been really entertaining and educational about the
events and issues in information security and digital privacy on a global
level.<br />
<a href="https://www.securityorb.com/documentary/cyberwar-season-1-episode-1-recap-who-is-anonymous/" target="_blank">Episode 1 looked at Anonymous</a><br />
<a href="https://www.securityorb.com/hack/cyberwar-season-1-episode-2-the-sony-hack/" target="_blank">Episode 2 looked at The Sony Hack</a><br />
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073732485 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
p
{mso-style-noshow:yes;
mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman",serif;
mso-fareast-font-family:"Times New Roman";}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-77409271348477292622018-09-14T11:18:00.002-04:002018-09-14T11:18:44.441-04:00Cyberwar Season 1 – Episode 2: The Sony Hack
<br />
<div class="MsoNormal">
Cyberwar Season 1 – Episode 2: The Sony Hack - <a href="https://www.securityorb.com/hack/cyberwar-season-1-episode-2-the-sony-hack/">https://www.securityorb.com/hack/cyberwar-season-1-episode-2-the-sony-hack/</a></div>
<div class="MsoNormal">
<br /></div>
So, I am on my second episode of “Cyberwar” hosted by Ben Makuch (@BMakuch)
a national security reporter. Cyberwar is a show where Ben travels the world to
meet with hackers, government officials, and dissidents to investigate the
ecosystem of cyberwarfare.<br />
The <a href="https://www.securityorb.com/documentary/cyberwar-season-1-episode-1-recap-who-is-anonymous/" target="_blank">first episode looked into the decentralized group of
international activist hackers known as “Anonymous”</a> while episode 2
explores <a href="https://www.securityorb.com/page/1/?s=Sony+" target="_blank">The
Sony Hack</a>. At that time (2014) the Sony Hack was one of the worst
attacks against a corporation. Not only were embarrassing emails
released, personal health records of employees and their family and social
security numbers to name a few were dumped. North Korea was named the
culprit and many people assumed it was due to an upcoming release of a movie
titled ‘The Interview” about the assassination of the North Korea leader.<br />
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073732485 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
p
{mso-style-noshow:yes;
mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman",serif;
mso-fareast-font-family:"Times New Roman";}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-81251536498140415322018-09-14T11:15:00.001-04:002018-09-14T11:15:40.153-04:00Cyberwar Season 1 – Episode 1 Recap: Who is Anonymous?
<br />
<div class="MsoNormal">
Cyberwar Season 1 – Episode 1 Recap: Who is Anonymous? - <a href="https://www.securityorb.com/documentary/cyberwar-season-1-episode-1-recap-who-is-anonymous/">https://www.securityorb.com/documentary/cyberwar-season-1-episode-1-recap-who-is-anonymous/</a></div>
<div class="MsoNormal">
<br /></div>
I started watching a very interesting program titled “Cyberwar” hosted by <em>Ben
Makuch</em> (@BMakuch) who is a national security reporter. The show is
described as:<br />
<em>Ben Makuch travels the world to meet with hackers, government officials,
and dissidents to investigate the ecosystem of cyberwarfare.</em><br />
The first episode looked into the decentralized group of international
activist hackers known as “Anonymous” which has been linked to numerous
high-profile incidents over the years, including Internet attacks on
governments, major corporations, financial institutions and religious
groups. A trademark for the online hacktivist group is a person wearing a
Guy Fawkes mask.<br />
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:roman;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073732485 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:#954F72;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
p
{mso-style-noshow:yes;
mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman",serif;
mso-fareast-font-family:"Times New Roman";}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Calibri;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-46898912378023934392018-09-14T11:04:00.002-04:002018-09-14T11:04:19.176-04:00A Book Review of "Practical Cyber Intelligence" by Wilson Bautista Jr. A Book Review of "Practical Cyber Intelligence" by Wilson Bautista Jr. - <a href="https://www.securityorb.com/featured/book-review-of-practical-cyber-intelligence-by-wilson-bautista-jr/">https://www.securityorb.com/featured/book-review-of-practical-cyber-intelligence-by-wilson-bautista-jr/</a><br />
<br />
Packt Publishing, in 2018 released “Practical Cyber Intelligence” by Wilson Bautista Jr. a retired military officer who holds the position of Director of IT and InfoSec at i3 Microsystems.<br />
<br />
I found this book to be very informative, easy to read as well as easy to follow once I engaged it. One of the key aspects that captured my attention pertained to the vital information and moreover the perspective into information security that is rarely discussed or examined in recent offerings. As a practitioner in the information security field, this book can serve as a handbook for team leads, managers, directors and CISOs responsible for securing organizational assets. As an educator of information security, this book can serve as a key role in courses dealing with in the management of information security as a possible text, but definitely as supplemental reading text.Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-73403010250113527812016-02-01T11:20:00.003-05:002016-02-01T11:20:44.044-05:00InfoSec Jobs – Vulnerability Management Consultant<a href="http://www.securityorb.com/infosec-jobs-vulnerability-management-consultant/">InfoSec Jobs – Vulnerability Management Consultant</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com1tag:blogger.com,1999:blog-1092589191457188836.post-19059579537548665612016-02-01T11:20:00.001-05:002016-02-01T11:20:03.856-05:00InfoSec Jobs – Security Operations Specialist<a href="http://www.securityorb.com/infosec-jobs-security-operations-specialist/">InfoSec Jobs – Security Operations Specialist</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com1tag:blogger.com,1999:blog-1092589191457188836.post-23584304002463866192016-01-11T15:35:00.001-05:002016-01-11T15:35:14.032-05:00The SecurityOrb Show – An Interview with Marcus J. Carey Founder of vThreat: A Cyber-Attack Simulation Company<a href="http://www.securityorb.com/vthreat-a-cyber-attack-simulation-service/">The SecurityOrb Show – An Interview with Marcus J. Carey Founder of vThreat: A Cyber-Attack Simulation Company</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com1tag:blogger.com,1999:blog-1092589191457188836.post-7257438827270894822015-11-22T15:29:00.001-05:002015-11-22T15:29:09.197-05:00Security vs Privacy: Encryption Technology After the Paris Attack<a href="http://www.securityorb.com/7662-2/">Security vs Privacy: Encryption Technology After the Paris Attack</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com1tag:blogger.com,1999:blog-1092589191457188836.post-2942715711416603582015-11-02T15:55:00.001-05:002015-11-02T15:55:39.917-05:00The Heartbleed Bug<a href="http://www.securityorb.com/the-heartbleed-bug/">The Heartbleed Bug</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com1tag:blogger.com,1999:blog-1092589191457188836.post-18701359321742368092015-10-28T00:33:00.001-04:002015-10-28T00:46:12.292-04:00The SecurityOrb Show – An Interview with ISSA-LA President Richard Greenberg<a href="http://www.securityorb.com/the-securityorb-show-an-interview-with-issa-la-president-richard-greenberg/">The SecurityOrb Show &#8211; An Interview with ISSA-LA President Richard Greenberg</a>
<iframe frameborder="0" scrolling="no" src="https://www.spreaker.com/embed/player/standard?episode_id=6909588&autoplay=false" style="height: 131px; width: 100%;"></iframe>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com1tag:blogger.com,1999:blog-1092589191457188836.post-7609950035567590932015-10-01T14:27:00.001-04:002015-10-01T14:27:49.208-04:00National Cyber Security Awareness Month Kicks Off<a href="http://www.securityorb.com/national-cyber-security-awareness-month-kicks-off/">National Cyber Security Awareness Month Kicks Off</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-48487078692501128892015-09-25T14:14:00.001-04:002015-09-25T14:14:45.471-04:00Obama, Xi vow cooperation on cybersecurity<a href="http://www.securityorb.com/obama-xi-vow-cooperation-on-cybersecurity/">Obama, Xi vow cooperation on cybersecurity</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com1tag:blogger.com,1999:blog-1092589191457188836.post-34831122909226211862015-09-25T12:44:00.001-04:002015-09-25T12:44:30.467-04:00DerbyCon 2015 Keynote/Track 2 Live Stream<a href="http://www.securityorb.com/derbycon-2015-keynote-live-stream/">DerbyCon 2015 Keynote/Track 2 Live Stream</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-88726675644031680752015-09-25T09:10:00.001-04:002015-09-25T09:10:51.133-04:00DerbyCon 2015 Keynote Live Stream<a href="http://www.securityorb.com/derbycon-2015-keynote-live-stream/">DerbyCon 2015 Keynote Live Stream</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-9020727747108942722015-09-21T12:20:00.001-04:002015-09-21T12:20:24.730-04:00Cyberattack 101: Why Hackers Are Going After Universities<a href="http://www.securityorb.com/cyberattack-101-why-hackers-are-going-after-universities/">Cyberattack 101: Why Hackers Are Going After Universities</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-2307674748048619342015-09-10T15:29:00.001-04:002015-09-10T15:29:41.216-04:00Creating a username and password to access OpenVAS<a href="http://www.securityorb.com/creating-a-username-and-password-to-access-openvas/">Creating a username and password to access OpenVAS</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-16498650750177976082015-08-31T10:26:00.001-04:002015-08-31T10:26:22.731-04:00My Security Thoughts – A Panel Discussion<a href="http://www.securityorb.com/my-security-thoughts-a-panel-discussion/">My Security Thoughts – A Panel Discussion</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-52889217770856550512015-08-24T13:13:00.001-04:002015-08-24T13:13:49.241-04:00My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It<a href="http://www.securityorb.com/my-security-thoughts-anonymity-and-privacy-there-is-none-nor-should-we-expect-it/">My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-40274349500702128542015-08-19T14:48:00.001-04:002015-08-19T14:48:17.617-04:00Hackers Dump Ashley Madison User Database… Where Most People Won’t Find It<a href="http://www.securityorb.com/hackers-dump-ashley-madison-user-database-where-most-people-wont-find-it/">Hackers Dump Ashley Madison User Database… Where Most People Won’t Find It</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-10105953096136904672015-08-16T16:04:00.001-04:002015-08-16T16:04:16.663-04:00My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It<a href="http://www.securityorb.com/my-security-thoughts-anonymity-and-privacy-there-is-none-nor-should-we-expect-it/">My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0tag:blogger.com,1999:blog-1092589191457188836.post-13175197902580763272015-08-15T23:37:00.001-04:002015-08-15T23:37:11.383-04:00NICE (National Initiative for Cybersecurity Education) Conference 2015<a href="http://www.securityorb.com/nice-national-initiative-for-cybersecurity-education-conference-2015/">NICE (National Initiative for Cybersecurity Education) Conference 2015</a>Kellep A. Charles, CISA, CISSP, NSA-IAMhttp://www.blogger.com/profile/07499677479597095209noreply@blogger.com0