Blog Posts Tagged with "Humor"

Ebe141392ea3ebf96ba918c780ea1ebe

Pre-Rejected CFP Submissions

September 27, 2012 Added by:Wendy Nather

A disturbing trend in security conferences is meta-talks that have nothing to do with pwning stuff. Burnout, sexism, career advice, economics, recruiting, food, exercise and other presentations on what's wrong with the security industry, are replacing actual knowledge transfer...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

How to Fake Network Security Monitoring

September 13, 2012 Added by:Javvad Malik

You’re the new guy in the security ops team, they’re giving you a very crucial and important job… Monitoring. You’ll be told how it is essential to be done correctly. But you notice that nobody really shows any interest in doing it. There’s are two reasons for this...

Comments  (4)

99edc1997453f90eb5ac1430fd9a7c61

On Secploitation...

August 14, 2012 Added by:Javvad Malik

To honour the new found love-affair the media has with security, I predict Hollywood will jump on the Secploitation bandwagon, so I’ve done the hard work and come up with some sample titles. If you’re a producer or director and need scripts, get your people to give my people a call. We can work something out...

Comments  (1)

Ebe141392ea3ebf96ba918c780ea1ebe

Security Slide Rules

June 29, 2012 Added by:Wendy Nather

First off, there must be a slide talking about The Problem We All Face and that it’s a scary, scary world out there, otherwise I would forget why we’re all here. Next, there must be a slide that includes icons of people, the cloudernet, and either monitors or CPUs. Extra points for creatively drawn bad guys...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Infosec Isn't for You If...

June 14, 2012 Added by:Ali-Reza Anghaie

Ali-Reza Anghaie - aka Packetknife - lays out a comprehensive and slightly humorous examination of why a career in information security may not be your cup of tea... How many describe you?

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Remember, Security Predictions Make...

February 15, 2012 Added by:Wendy Nather

Security predictions can be a great way of starting conversations if you look at them the right way. If you look at them the wrong way, they're great for raising a huge chorus of "Nuh-UH!" or even "You're kidding, right? Call the coroner..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Can You Explain Encryption to Me?

January 23, 2012 Added by:Javvad Malik

I assumed that senior technology managers would have half a clue about technology. I have thought long and hard about this and think the easiest way to explain this would be to replace the word encryption with witchcraft. It too is misunderstood by the masses...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Duqu Malware Authors Display Sense of Humor

November 14, 2011 Added by:Headlines

"This is another prank pulled by the Duqu authors, since Showtime Inc. is the cable broadcasting company behind the TV series Dexter, about a CSI doctor who happens also to be a serial killer who avenges criminals in some post-modern perversion of Charles Bronson’s character in Death Wish..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security versus Compliance - A Simple Graphic

October 18, 2011 Added by:Javvad Malik

Taken from the ever popular Security Vs Compliance Video is a poster that sums it up so you can share with colleagues or use it in presentations. Because we know nothing spices up a boring powerpoint presentation than a badly edited photo. Hey, it’s better than clip art...

Comments  (1)

Ec9b0ab31140696dd578b354b1054635

On Romulan Ale and Bird of Prey Malware

July 20, 2011 Added by:Vulcan Mindm3ld

Defenders are bound by a set of process and procedures. An organization’s inflexibility in deviating from them compound the problems. Many changes are often rejected on the basis of economic concerns. The majority are focusing on useless security guidelines such as the DISA PDI GEN001280...

Comments  (2)

E973b16363b3de77b360563237df7e32

Top 5 Ridiculous Hacking Scenes in Movies

November 03, 2010 Added by:Bozidar Spirovski

Like any technology-fed phenomenon with increasing public exposure, hacking is often ill-conceived and exaggerated in movie scenes. The following are five of the most implausible and amusing scenes that have resulted from this approach to hacker depiction in movies...

Comments  (13)

99edc1997453f90eb5ac1430fd9a7c61

A Cynics guide to Infosec Consultancy

June 18, 2010 Added by:Javvad Malik

So you want to be an infosec consultant? If you’re like most guys, its better you consider a career in risk management or audit. Or maybe you’ve already got some variation of “security” in your job title but are stuck in a rut. Results are coming slowly and career progression is almost non-existent. What you need is a dose of cynic motivation to deliver a swift kick in the ...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

Most overhyped security

June 16, 2010 Added by:Javvad Malik

Whether you call it security theatre or just a sales pitch that sets expectations too high. We've had lots of products and processes that have claimed to increase security only to contain enough hot air to propel one of Richard Bransons baloons across the world.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Most annoying consultants

June 13, 2010 Added by:Javvad Malik

Infosec would have a better reputation if all consultants were perfect like me. When speaking to a project manager, we should have completed our research. Scoured the internet, finding out what a particular application does and how many security vulnerabilities are out there. The list goes on, but suffice to say a good consultant always does their homework before they actually start talking t...

Comments  (3)

99edc1997453f90eb5ac1430fd9a7c61

Divine Security Policy

June 12, 2010 Added by:Javvad Malik

So companies spend countless hours writing their security policies and this isn't an easy task. Each policy has to be drafted, proof read, re-drafted, re-proof read and then published. It's at this point that the real fun begins where users have to be educated in the ways of the new policy. Gap analysis have to be conducted and new baselines set.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Reasons to love infosec

May 22, 2010 Added by:Javvad Malik

Infosec sometimes unfairly gets a lot of bad press for being a barrier to business goals and objectives. How infosec professionals don’t understand business needs and drivers. How pouring money into security is about as good as burning it. But infosec has improved the quality of working and the lives of workers the world over.

Comments  (0)

Page « < 1 - 2 > »
Most Liked