27 posts categorized "Law Enforcement" Feed

LMTV Live | Modern Attack Vectors – A Compounded Headache (with Andrew Vladimirov)

EVENT START TIME: 9:30 AM PST - Wednesday, September 5th, 2018

This week we will be talking with Andrew Vladimirov of Arhont Information Security, about the new tricks hackers are using to get their hands on your data and do other nasty things.

Before you implement counter information security measures, do you know what you are protecting against? Do you understand the actual risks your business faces and the attacker strategies that are used?

Determined and skilled hackers employ a combination of social engineering and technical (client/server/application/database/all 7 OSI layers network) attack means which interchange subject to how events unfold and where the next available gap can be found. Until you fully understand how an attacker approaches work in combination of these methods and how these create compounded risks, you will continue building virtual Maginot lines and gasping at being outflanked yet another time. 

In this LMTV session we will discuss the how hackers combining social engineering and technical attacks, make the most devastating and difficult to protect against today.  We will suggest ways you should start planning against these.

LMTV LIVE | Resilience Within A Security Architecture (with Keith Bromley and Steve McGregory)

LIVE EVENT START TIME : Wednesday, May 30, 2018 - 9:30 AM PST

NetworkVis_Ad_TroubleshootIT_170x200Keith Bromley and Steve McGregory from Keysight Technologies (formerly Ixia) will be talking about a security architecture concept called Network Security Resilience. While this concept is not new, it has received as much attention as typical defensive strategies have. This may change with the new NIST Framework for Improving Critical Infrastructure Cybersecurity that places more effort on breach recovery and mitigation.

Basically, it’s not a question of IF your network will be breached, but WHEN. News broadcasts for the last several years have shown that most enterprise networks will be hacked at some point. In addition, the time it takes for most IT departments to notice the intrusion usually takes months—over six months according to the Ponemon Institute. This gives hackers plenty of time to find what they want and exfiltrate whatever information they want. What if you could reduce that time to 1 month, i.e. cut it to 1/6 of the time? Or maybe reduce it further to one week, or maybe to just one day? What if you could go further? Would that be of interest to you? 

Continue reading "LMTV LIVE | Resilience Within A Security Architecture (with Keith Bromley and Steve McGregory)" »

LMTV WTF | Who Protects your Data when Renting a Car (by Tony Fortunato)

YouTube LIVE Event: October 5, 2016 - 9:30 AM PST

WaldoThis week, Tony Fortunato will talk about his rental car data experience.

How much information do you leave behind after your rental?


We are all concerned about protecting our personal information.

Tony FortunatoWe have all heard of various events where servers are hacked, peoples computers or phones get hacked, etc..

In this episode, Tony will discuss various examples where you unknowingly leave your personal, private data in the equipment of other people or companies. Tony recently wrote an article sharing his personal experience with a car rental when he was on the road.

Click to read other LMTV posts by contributors of LoveMyTool »

LMTV LIVE | Cyber Security for SCADA Networks (with David Thomason of Thomason Technologies)

Live Event: Wednesday, August 3, 2016 - 9:30 AM PST

416939We will be talking with David Thomason this week, who is the Founder and President of Thomason Technologies, a cyber security company located in San Antonio, TX and since 2007, has been providing solutions for both traditional as well as SCADA (industrial control) networks.

Historically, security products have been viewed as difficult to use and expensive hindrances to workplace productivity. Management cringed at the thought of security products slowing their networks to a crawl and bogging down the flow of information. These limitations are no longer true, as you will learn from David this week.

David-Head-shot-1024x805Prior to founding Thomason Tech, David, was the Senior Director of Security Engineering at Sourcefire, leading a team of over 25 security engineers and consultants. David started his career in computer security in 1986, working in the United States Air Force, serving Electronic Security Command, the Air Intelligence Agency, the Air Force Information Warfare Center (AFIWC) and the Air Force Computer Emergency Response Team (AFCERT).

While working as an incident response team lead for the AFCERT, David was the first person to have three hackers apprehended in separate security incidents. Since then, David has provided security services including security deployments, incident response, risk assessments, penetration tests, and vulnerability assessments for well over 100 companies.

Apple, Apple, Apple! Apple versus the United States FBI! (by The Oldcommguy®)

Apple, Apple, Apple!

The silly battle of Apple versus the United States Courts and the FBI!

In my humble opinion this has turned out to be one of Apple’s greatest marketing events in years, maybe forever.

Apple is trying to tell its users that Apple will protect their privacy from the big bad FBI and other Governmental access!

The reality is that all this should never have gotten into the news world. Apple is a U.S. company and should have been a good citizen and quietly told the FBI to send the phone and they would quietly get the information for them. This is NOT just any person’s phone – first it is the phone of a dead individual and secondly it is the phone of a terrorist and third it is the phone of a murderer that could be filled with intelligence that may help stop the next deadly attack!

This big media event is nothing but a big market show from Apple and it is getting a lot of silly attention, what for? I wonder how many people will now decide to buy Apple products, I am sure the terrorists will, but is that a good market? Apple enjoys the freedom to make billions as a U.S. company but when it came time to be a good citizen they decided to be a bunch of hypocrites and actors in a fictitious marketing event!

Bad worm w pointerApple do not be a bad worm with a Great Technology!


Continue reading "Apple, Apple, Apple! Apple versus the United States FBI! (by The Oldcommguy®)" »