Quantcast
Channel: Michael Buckbee – Inside Out Security
Browsing all 111 articles
Browse latest View live

Is a ransomware attack a data breach?

Ransomware is a loss of control Most IT people equate exfiltration of data from their network as the point at which control is lost and a data breach has occurred. They think of it like “where are the...

View Article



Image may be NSFW.
Clik here to view.

A Guide to per State Data Breach Response

Part 1: Preparing for a US Data Breach In the data management and IT space there have been significant consideration and hand wringing about how the European Union’s General Data Protection Regulation...

View Article

Image may be NSFW.
Clik here to view.

[Podcast] Taking The Long View, Investing in Technology and Security

  Leave a review for our podcast & we'll send you a pack of infosec cards. We’re living in exciting times. Today, if you have an idea as well as a small budget, you can most likely create it. This...

View Article

Image may be NSFW.
Clik here to view.

US State Data Breach Law Definitions

We discussed in Part 1: A Guide to Per State Data Breach Response the importance of understanding what classes of data you have in your control. We stress this point as it’s easy to get lost in the...

View Article

Image may be NSFW.
Clik here to view.

[Podcast] Tracking Dots, Movement and People

  Leave a review for our podcast & we'll send you a pack of infosec cards. Long before websites, apps and IoT devices, one primary way of learning and sharing information is with a printed...

View Article


Image may be NSFW.
Clik here to view.

[Podcast] What Does the GDPR Mean for Countries Outside the EU?

  Leave a review for our podcast & we'll send you a pack of infosec cards. The short answer is: if your organization store, process or share EU citizens’ personal data, the General Data Protection...

View Article

Data Security Software: Platforms Over Tools

As recent security incidents like NotPetya, Wannacry and the near daily data breach reports have shown, data security isn’t getting easier. And it’s not because IT groups aren’t putting in the work. IT...

View Article

Image may be NSFW.
Clik here to view.

How to Better Structure AWS S3 Security

If the new IT intern suggests that you install a publicly accessible web server on your core file server – you might suggest that they be fired. If they give up on that, but instead decide to dump the...

View Article


Image may be NSFW.
Clik here to view.

[Podcast] Presenting Cybersecurity Ideas to the Board

  Leave a review for our podcast & we'll send you a pack of infosec cards. There’s been a long held stigma amongst our infosec cohort and it’s getting in the way of doing business. What’s the...

View Article


How to use PowerShell for WannaCry / WannaCrypt cleanup and prevention

Explosive ransomware infection rates of WannaCrypt/WannaCry have IT groups trying to mass diagnose, update and protect their machines. Thing is, that’s just not practical to do manually – for pretty...

View Article

Is a ransomware attack a data breach?

Ransomware is a loss of control Most IT people equate exfiltration of data from their network as the point at which control is lost and a data breach has occurred. They think of it like “where are the...

View Article

Image may be NSFW.
Clik here to view.

A Guide to per State Data Breach Response

Part 1: Preparing for a US Data Breach In the data management and IT space there have been significant consideration and hand wringing about how the European Union’s General Data Protection Regulation...

View Article

Image may be NSFW.
Clik here to view.

[Podcast] Taking The Long View, Investing in Technology and Security

  Leave a review for our podcast & we'll send you a pack of infosec cards. We’re living in exciting times. Today, if you have an idea as well as a small budget, you can most likely create it. This...

View Article


Image may be NSFW.
Clik here to view.

Data Breach Definition by State

In the data management and IT space there have been significant consideration and hand wringing about how the European Union’s General Data Protection Regulation (GDPR) will eventually impact US based...

View Article

Image may be NSFW.
Clik here to view.

[Podcast] Tracking Dots, Movement and People

  Leave a review for our podcast & we'll send you a pack of infosec cards. Long before websites, apps and IoT devices, one primary way of learning and sharing information is with a printed...

View Article


Image may be NSFW.
Clik here to view.

[Podcast] What Does the GDPR Mean for Countries Outside the EU?

  Leave a review for our podcast & we'll send you a pack of infosec cards. The short answer is: if your organization store, process or share EU citizens’ personal data, the General Data Protection...

View Article

Data Security Software: Platforms Over Tools

As recent security incidents like NotPetya, Wannacry and the near daily data breach reports have shown, data security isn’t getting easier. And it’s not because IT groups aren’t putting in the work. IT...

View Article


Image may be NSFW.
Clik here to view.

How to Better Structure AWS S3 Security

If the new IT intern suggests that you install a publicly accessible web server on your core file server – you might suggest that they be fired. If they give up on that, but instead decide to dump the...

View Article

Krack Attack: What You Need to Know

For the last decade, philosophers have been in agreement that there is another, deeper level within Maslow’s Hierarchy of Human Needs: WiFi Access. We’re now at the point where even the most mundane...

View Article

Image may be NSFW.
Clik here to view.

[Podcast] Bring Back Dedicated and Local Security Teams

  Leave a review for our podcast & we'll send you a pack of infosec cards. Last week, I came across a tweet that asked how a normal user is supposed to make an informed decision when a security...

View Article
Browsing all 111 articles
Browse latest View live




Latest Images