2017 Verizon DBIR – Human Perspective

The 2017 Verizon DBIR (Data Breach Investigations Report) is out.  For those of you who are unfamiliar with it, this is THE data driven report that helps you better understand threats and what are the leading causes of incidents / breaches. The report is important as it provides a trusted resource to help you make data driven decisions on what you […]

Applying Security Awareness to the Cyber Kill Chain

The term “kill chain” is a term used originally by the military to define the steps the enemy uses to attack a target.  In 2011 Lockheed Martin released a paper defining a “Cyber Kill Chain”.  Similar in concept to the military, this paper defines the steps used by cyber attackers in today’s cyber based attacks.  The theory […]

An open letter to…. Everyone. I hope you enjoy.

Hello to all of my friends, associates and those who don’t know me well but decided to share a few minutes of your life to read a little bit about mine. I want to talk to you for just a second. First, let’s put aside all the Beast Mode Life and Beast Mode Security stuff […]

Microsoft July Security Updates Mostly Browser-Related

Patch Tuesday includes 53 security updates, including mitigation for the latest side-channel attack. Microsoft issued a range of security patches today, including its anticipated exploit-mitigation update for the so-called Lazy FP State Restore vulnerability in Intel microprocessors. Intel late last month disclosed Lazy FP State Restore (CVE-2018-3665), the latest speculative execution side-channel vulnerability to be discovered since […]

The Best Job Hunting Advice I Have Ever Received

I went to a Veteran’s Job Event and the lessons I learned will change my life and yours too. I have been in the job market for 152 days at the time this article was written. As you could expect, being unemployed for 152 days, I have applied to a lot of companies. In fact, […]

The OSI model explained: How to understand (and remember) the 7 layer network model

By Keith Shaw Network World | DEC 4, 2017 11:09 AM PT A tutorial on the Open Systems Interconnection networking reference model and tips on and how to memorize the seven layers When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven […]

Ethical Hacking Methodology Explained

Mario Worwell Information Technology Consultant | Network Engineer | IT Security | Fitness Blogger Ethical Hacking You’re probably familiar with the term “hacking,” which refers to gaining unauthorized access to data within a computer or network system. Hacking is illegal and can harm the system it’s targeted, but there is also something called “ethical hacking,” […]

Reactive or Proactive? Making the Case for New Kill Chains

7/6/2018 10:30 AM Ryan Stolte – Commentary Classic kill chain models that aim to find and stop external attacks don’t account for threats from insiders. Here what a modern kill chain should include. The kill chain model is not new to most security professionals. Created in 2011 by Lockheed Martin, the model highlights the seven stages […]

The Star Spangled Banner Story

When we think of the United States, we immediately think of the Star Spangled Banner, the country’s national anthem. Who has not heard of the Star Spangled Banner? Even non-Americans are familiar with its tune. But how did the story of the Star Spangled Banner begin? How did it get to be the national anthem? […]

History of the Fourth of July

Did you know New York City has the biggest fireworks display in the United States and that three U.S. presidents died on July 4? The Fourth of July – also known as Independence Day or July 4th – has been a federal holiday in the United States since 1941, but the tradition of Independence Day […]