What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
ahay.webp 2021-02-10 01:21:37 Jupyter Notebook for crt.sh Queries (lien direct) I created a Jupyter Notebook to query the crt.sh website, dump the results into a pandas data frame, and then printing out the unique list of results to the screen for OSINT investigations.
ahay.webp 2019-12-02 13:57:26 Tornados, Necessity, and the Evolution of Mitigating Controls (lien direct) According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount […] APT 32
ahay.webp 2018-09-27 14:36:31 Do You Suffer From Breach Optimism Bias? (lien direct) Optimism bias is the belief that each of us is more likely to experience good outcomes and less likely to experience bad outcomes. How prevalent is this in the cybersecurity industry? If you're a salty security professional like me, you already know the answer.
ahay.webp 2018-07-26 16:07:24 Insurance Occurrence Assurance? (lien direct) The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection for the operational state of your organization than cyber security insurance alone. To put it another way, insurance is a reactive measure whereas an effective security program is a proactive measure.
ahay.webp 2018-07-24 15:01:48 Free SANS Webinar: I Before R Except After IOC (lien direct) Join Andrew Hay on Wednesday, July 25th, 2018 at 10:30 AM EDT (14:30:00 UTC) for an exciting free SANS Institute Webinar entitled “I” Before “R” Except After IOC. Using actual investigations and research, this session will help attendees better understand the true value of an individual IOC, how to quantify and utilize your collected indicators, and what constitutes an actual incident.
ahay.webp 2018-04-30 22:40:06 Interviewed on RSAC TV (lien direct) I had the pleasure of being interviewed by Eleanor Dallaway, Editor and Publisher – Infosecurity Magazine, on RSA Conference Television (RSAC TV) last week at the annual RSA Security Conference. In the interview, we spoke of what I had observed on the show floor, the state of the security industry, and I describe my perfect customer in […]
ahay.webp 2018-01-10 16:21:50 Security Beyond The Perimeter (lien direct) Whether we like it or not, the way we architect, utilize, and secure the networks and systems under our control has changed. When servers were safely tucked away behind corporate firewalls and perimeter-deployed intrusion prevention controls, organizations became complacent and dependent on their host security. Unfortunately, inadequately architected security controls that rely solely on broad network-based protection can make the migration of an organization's systems to private, public, and hybrid cloud hosting even more exposed to attackers than they were before. Everyone has heard the “defense in depth” analogy relating security to a medieval castle with controlled access to different locations of the castle and a defensive moat around the perimeter. This “hard outside” and “soft inside” model was designed to make it as difficult as possible to get past the perimeter. However, once inside the walls, the trusted individual had elevated access to resources within the network. Unsurprisingly, the medieval defense analogy has lost much of its relevance in a world where systems and users move effortlessly from within the confines of a walled corporation, to a local coffee shop, and perhaps even to a different country as part of normal business operations. Securing the next generation of hosting platforms requires a new approach that not every organization is ready for. Some industry analyst firms promote the idea of a “cloud first strategy” for all technology deployments. Though not a bad idea, per se, this doesn't mean that forklifting your entire architecture into cloud or containerized environments should be your number one priority – especially if you're being forced to choose between a new architecture and the traditional security controls that you depend upon. Thankfully, technology has evolved to allow for more seamless security in environments that need to span traditional datacenters, virtualization, and cloud environments. This has allowed organizations to grow their capabilities without the need to choose between having security and having new technology stacks. So how do we, as security professionals and business owners, decide what mitigating controls should be deployed to future-proof our security? It's actually much easier than it sounds. To learn more about how to perform security beyond the perimeter please read my full post on https://www.juniper.net/us/en/dm/security-beyond-the-perimeter/.
ahay.webp 2017-11-20 21:14:40 The Hay CFP Management Method – Part 2 (lien direct) I've had a lot of positive feedback from my first post which explained how to create the Trello board to track your Call For Paper (CFP) due dates, submissions, and results. In this post, I'll explain how to create the cards and populate them with the required data to better manage your CFP pipeline. To start your first card click the ‘Add a card…' link in the CFP Open swim lane. Type in the name of the conference and select the 'Add' button. Once the card is added, click the pencil icon to add more context. Within the card, place the location of the conference in the 'Add a more detailed subscription…' section and select the Save button. Note: I strongly advise that you follow a consistent location naming (e.g. Houston, TX or Houston, TX, USA) to make visualizing the data easier later on. Now we have to add the CFP due date. Select the 'Due Date' button. When I input the CFP due date, I often use the date prior to the published due date ( I also set the time to 11:59pm) as a way to ensure I don't leave the submission to the absolute last minute. After the date is selected I fill the card with more CFP-specific information that I find from the event website, Twitter, or a third-party CFP site. I also pate the URL for the CFP submission form into the card so that I don't have to hunt for it later (it automatically saves it as an attachment). If other information, such as important dates, conference details, or comments about the event are available I often add those in the 'Add Comment' section. Just make sure to his the 'Save' button or the data won't be added to the card. Optionally, you can leverage the 'Labels' button to assign color coded tags to denote different things. For example, I've used these to denote the audience type, the continent, country, state/province where the event is located, and whether or not travel and expenses (T&E) are covered. These are really just informational to help you prioritize events. Click the 'X' at the top right hand side of the card or click somewhere else on the board to close the card. You now have your first conference CFP card that can be moved through the board calendar pipeline – something that I'll discuss in my next blog post.
ahay.webp 2017-09-25 12:27:47 The Hay CFP Management Method (lien direct) People often ask me how I manage the vast number of abstracts and security call for papers (CFPs) submissions. So I thought I’d create a blog post to explain my process. For lack … Continue reading The Hay CFP Management Method →
ahay.webp 2017-08-16 14:28:39 Detect and Prevent Data Exfiltration Webinar with Infoblox (lien direct) Please join SANS Institute Instructor and LEO Cyber Security Co-Founder & CTO Andrew Hay and Infoblox Security Product Marketing’s Sam Kumarsamy on Thursday, August 17th, 2017 at 1:00 PM EDT (17:00:00 UTC) as they present a SANS Institute webinar entitled Detect & Prevent Data Exfiltration: A Unique Approach. Overview Data is the new currency in the modern digital … Continue reading Detect and Prevent Data Exfiltration Webinar with Infoblox →
ahay.webp 2017-06-29 17:27:28 Petya Ransomware: What You Need to Know and Do (lien direct) Unless you've been away from the Internet earlier this week, you've no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday.
ahay.webp 2017-05-03 18:27:50 Diving into the Issues: Observations from SOURCE and AtlSecCon (lien direct) Last week I had the pleasure of presenting three times, at two conferences, in two different countries: SOURCE in Boston, MA and at the Atlantic Security Conference (AtlSecCon) in Halifax, NS, Canada. The first event of my week was SOURCE Boston. This year marked the tenth anniversary of SOURCE Conference and it continues to pride … Continue reading Diving into the Issues: Observations from SOURCE and AtlSecCon →
ahay.webp 2017-03-20 15:44:31 Transitioning from my CISO role at DataGravity (lien direct) As of today I'm transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies.
ahay.webp 2017-03-17 18:54:17 Weekend reading: Friday, March 17, 2017 (lien direct) We’re back with this week’s edition of “Weekend Reading.” Below are some of the data stories from this week that you just can’t miss. I know that I found each of them beneficial (and equally …
ahay.webp 2017-03-17 15:25:45 We have your data: how to fight ransomware (lien direct) Of all the cybersecurity threats out there, one consistently strikes a nerve: ransomware. Maybe it’s because being held for ransom is so personal, or perhaps it’s the fact that you’re totally frozen out of your …
ahay.webp 2017-03-14 17:01:29 2016 broke security records, but 2017 is on track to be worse (lien direct) It’s no secret that 2016 was a tough year for security and IT pros. From reported security issues behind the U.S. election to the Beautiful People hack, the year was plagued by countless breaches that …
ahay.webp 2017-03-10 23:32:25 Please take a moment to fill out my survey… (lien direct) None
ahay.webp 2017-03-10 21:30:35 Weekend reading: Friday, March 10, 2017 (lien direct) I, like many of you, catch up on news over morning coffee on the weekend. Starting today, I’m going to post some of the more interesting data-related stories that I found both interesting and helpful in my …
ahay.webp 2017-02-24 18:26:15 Ransomware takes center stage at the RSA Conference (lien direct) Last week, I attended, presented, and hosted a series of sessions at the annual RSA Conference in San Francisco. Attendees were treated to scary stories about new threats, attack mechanisms, and dangerous technologies causing headaches …
Last update at: 2024-04-25 16:09:15
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter