Blogs: Stuck In Traffic

Options

Download
1st Format
DROP FORMAT
2nd Format
DROP FORMAT
3rd Format
DROP FORMAT
4th Format
DROP FORMAT
5th Format
DROP FORMAT
6th Format
DROP FORMAT
Drag and drop video formats you wish to download into placeholders above (if the "1st Format" is not available for download, the "2nd Format" will be used and so on):
  • High Quality WMV
  • WMV
  • High Quality MP4
  • MP4
  • Low Quality MP4
  • MP3
Tags
Active Directory
analysis
Android
antivirus
anti-virus
Anti-Virus
Application Development
Architecture
Authentication
AWS
batch
build tools
BYOD
children
Cloud
Cloud Computing
CMS
Collaboration
Conference
Configuration
Crypto
culture
Data
Database
Devices
devops
Education
Email
Encryption
exchange+server
Facebook
feedback
File Sharing Protocols Plugfest 2009
Gestures
GitHub
hack
hacks
Healthcare
Help Desk
HTTP
information security
Internet
ip
IPv6
IT Pro
IT professionals
jobs
laws
LinkedIn
logging
Login
macros
Medical
Mentoring
Merger
Methodologies
Mobile
Networking
NuGet
Open Source
OSS
passwords
Performance
phishing
PowerShell
Privacy
Project Management
remote access
Robotics
SDLC
Security
Social Media
Storage
strategy
teams
threat modeling
Training
URL
USB
usb drives
Videos
viruses
WiFi
Windows 10
Work Life
What Tags Who When
Bleeding Data Security David Giard 11/4/2016
Insider Threat Security David Giard 11/4/2016
Percentage of Revenue Security David Giard 11/4/2016
Tactics, Strategy, Culture Security, strategy, culture David Giard 11/4/2016
Bypassing Outlook's Two-Factor Authentication Security, exchange+server David Giard 11/4/2016
DDoS, DNS, SaaS, BCP Security David Giard 10/29/2016
Amnesty International Ranks Messaging Encryption Encryption, Security David Giard 10/29/2016
Word Document Evasion Technique Security, macros David Giard 10/29/2016
Evidence-based Decisions Security David Giard 10/29/2016
Step Up Security, Authentication David Giard 10/29/2016
Open Source Security, Open Source, OSS David Giard 10/22/2016
What Makes a Mentor Mentoring, Security David Giard 10/19/2016
Why They Roll Their Own Crypto Security, Crypto David Giard 10/19/2016
Defending Manufacturing Security David Giard 10/19/2016
IR Recovery Mistakes Security David Giard 10/19/2016
Virtual Currencies Conference, Security David Giard 10/19/2016
How Many Threat Models threat modeling, Security David Giard 10/18/2016
Persistence in Group Policy Active Directory, Security David Giard 10/18/2016
Preventing Breaches with Search Engines Security David Giard 10/18/2016
SAST and the Malicious Insider Security David Giard 10/18/2016
Behavior Change Security David Giard 10/7/2016
Mirai Botnet Source Code Security, IT Pro David Giard 10/6/2016
New Acquisitions Security David Giard 10/3/2016
Application Whitelisting Security David Giard 10/1/2016
Standards and Policies Security David Giard 10/1/2016
Whitebox Fuzzing and Project Springfield Security David Giard 10/1/2016
Escorting Vendors during Remote Support Security, remote access David Giard 10/1/2016
What i-Dressup Tells us about Response Security, passwords David Giard 10/1/2016
Making Mistakes Security David Giard 9/23/2016
When Documentation Attacks Security David Giard 9/22/2016
Educating the Educators Education, Security David Giard 9/21/2016
Sender Policy Framework (SPF) Security, Email, Authentication David Giard 9/20/2016
Patch! But don't rely on patches. Security David Giard 9/17/2016
AWS is a go for PCI DSS Security David Giard 9/16/2016
Call Trees Security David Giard 9/16/2016
DevOps Velocity, take-aways from #HPEProtect Security David Giard 9/16/2016
Organized Crime, Take-aways from #HPEProtect Security David Giard 9/16/2016
Prioritizing Security Vulnerabilities Security David Giard 9/16/2016
Shared Private Keys Aren't Private Encryption, Security David Giard 9/8/2016
Competitive Slacking Security, Work Life David Giard 9/8/2016
Honeypots Security David Giard 9/2/2016
Buying Time with RASP analysis, Security David Giard 9/2/2016
Encrypted Content, Unencrypted Logs Encryption, logging, Security, Login David Giard 9/2/2016
Mr Robot FSociety Ransomware Security David Giard 9/2/2016
Stop Young Domains Security David Giard 9/2/2016
Opsec, Bro Security David Giard 9/2/2016
BCP Exercises Security David Giard 8/24/2016
Centrally Managing Obligations Security David Giard 8/24/2016
Business continuity planning Security David Giard 8/24/2016
Edge's PDF Vulnerability Security David Giard 8/24/2016
Vendor Risk Management Cloud Computing, information security David Giard 8/24/2016
Using a Capabilities Matrix Security David Giard 8/24/2016
Communities Security David Giard 8/24/2016
Security Reasonableness Test Security David Giard 8/24/2016
Security Automation with IFTTT Security David Giard 8/24/2016
Cyphertext Attacks, Key Rotation, and Apple iMessage Encryption, Security David Giard 8/24/2016
Load Balancing for Denial of Service Security David Giard 8/24/2016
Criminals Picking on the Little Guy Security David Giard 8/6/2016
Handling Security Concerns Right Security David Giard 8/6/2016
Router and Firewall Controls Security David Giard 8/6/2016
Three Common PCI Misunderstandings Security David Giard 8/6/2016
Ghostbusters and Toolmaking build tools, Security David Giard 7/28/2016
Considerations for Securing Application SDLC, Security, Application Development David Giard 7/28/2016
Check your Privilege Security, Windows 10 David Giard 7/28/2016
TSA Master Keys and Key Escrow Security David Giard 7/28/2016
Identifying Malicious Activities during Mergers Merger, Networking, Security David Giard 7/24/2016
Intellectual Property and Bread laws, Security David Giard 7/24/2016
Enforced Encryption in AWS S3 AWS, Security, Storage, IT professionals David Giard 7/23/2016
Honey Credentials IT Pro, Security, IT professionals David Giard 7/23/2016
Mobile Threats, Controls, and Management Mobile, BYOD, Security, IT professionals David Giard 7/23/2016
Hak4Kidz parked at BSidesDetroit Robotics, Security, children David Giard 7/16/2016
Decrypting for Data Loss Prevention Data, Encryption, Security David Giard 7/16/2016
DevOps Change Rates and Risk devops, Security David Giard 7/16/2016
The Shard Utility IT Pro, Security, passwords David Giard 7/14/2016
Medium's Vulnerability and Collaboration Security, Collaboration, Social Media David Giard 7/14/2016
Beating Ransomware in 8 steps Security David Giard 7/7/2016
Stolen Phone, Broken Crypto . J Wolfgang Goerlich J Wolfgang Goerlich Android, Encryption, Security David Giard 7/6/2016
Leveraging in-flight Projects Security, Project Management David Giard 7/5/2016
Why Model and Detect Late Stage Attacks Security David Giard 7/1/2016
Cowboys and Quick Draw Changes Security David Giard 6/29/2016
Drive Encryption, Secure Wipes, and Awareness Encryption, Security David Giard 6/29/2016
Remote Access Security, remote access David Giard 6/29/2016
Social Engineering with HTML Apps Security David Giard 6/27/2016
Vulnerable Configurations Security, Configuration David Giard 6/25/2016
The IKEA Effect Security David Giard 6/25/2016
FICO Security Score Security David Giard 6/25/2016
Dedicated Security Teams Security, teams David Giard 6/18/2016
BadBlock Ransomware Security, IT Pro David Giard 6/17/2016
Getting Ahead of Password Reuse LinkedIn, Security, passwords, IT Pro, GitHub David Giard 6/17/2016
Blame the Victim Facebook, Help Desk, Security, Social Media David Giard 6/14/2016
Stopping Work that looks like Work Security, IT Pro, jobs David Giard 6/13/2016
Redundancy Encryption Encryption, Internet, HTTP, IT Pro David Giard 6/11/2016
The Unencrypted Millions Encryption, File Sharing Protocols Plugfest 2009 David Giard 6/11/2016
DRM, IRM, DLP, ETC Encryption, Security, IT Pro David Giard 6/8/2016
Ransomware Bypassing EMET Security David Giard 6/8/2016
Seasonal Security Reviews Security David Giard 6/4/2016
Policies Security, IT Pro David Giard 6/4/2016
Prioritizing Controls Security David Giard 6/4/2016
Brute Forcing Gestures Authentication, Gestures, Security David Giard 5/30/2016
Security as a Product Security, Cloud David Giard 5/30/2016
Career Jumps and the Red Baron Security David Giard 5/24/2016
Local File Inclusion Security David Giard 5/24/2016
Image Tragic Security David Giard 5/20/2016
Safe Cracking and Time Based Security Security David Giard 5/20/2016
OK Cupid and the Broken Heart Security, hacks David Giard 5/16/2016
Assessing Processes with Third Parties Security David Giard 5/13/2016
Save a Life or Stop a Virus Anti-Virus, anti-virus, Healthcare, Medical, Privacy, Security, viruses, antivirus David Giard 5/12/2016
Swiss Cheese Model Security David Giard 5/11/2016
Defensible Architectures Architecture, Security David Giard 5/10/2016
Responding to PowerShell PowerShell, Security David Giard 5/10/2016
Locky and Having a fighting chance Security David Giard 5/6/2016
Encrypting Data Interchanges Encryption, Security, Database, Data David Giard 5/6/2016
Tightening the Feedback Loop Security, feedback David Giard 5/4/2016
Don't Play with CMS CMS, Security David Giard 5/3/2016
Clearing Phishes Email, phishing, Security David Giard 5/2/2016
Metrics on Results Email, phishing, Security David Giard 5/1/2016
Minimum Viable Frameworks Security, Training David Giard 4/30/2016
Presidential Candidate Apps Security David Giard 4/30/2016
Repurposing Equipment for Disaster Recovery Security David Giard 4/30/2016
Stopping Rogue WiFi Security, WiFi David Giard 4/25/2016
Bypassing AppLocker Security David Giard 4/23/2016
New Firewalls Security, IT Pro David Giard 4/21/2016
Hijacking DNS phishing, Security David Giard 4/20/2016
Criminal Practices Security David Giard 4/19/2016
Unintended Consequences of Defaults ip, IPv6, Security David Giard 4/18/2016
URL Shorteners URL, Security David Giard 4/16/2016
Preserving Formats, Preserving Performance Architecture, Performance, Security David Giard 4/14/2016
Disk Encryption Encryption, Security David Giard 4/13/2016
Managing the News Cycle Security, IT professionals, IT Pro David Giard 4/12/2016
Package Managers Security, Videos, NuGet, batch David Giard 4/11/2016
Assessments to Remediation Security David Giard 4/8/2016
Pesky People and their USB Drives USB, Security, usb drives David Giard 4/7/2016
Minimalism in Incident Response Architecture, Security David Giard 4/6/2016
Something Borrowed Devices, Security David Giard 4/5/2016
Apps and Secrets Encryption, Security, passwords David Giard 4/4/2016
KeRanger Ransomware Security David Giard 4/4/2016
Blocking IP Scans Security, hack, IT Pro David Giard 4/4/2016
FIRST Principles Robotics David Giard 4/4/2016
The Easy, The Hard Architecture, Methodologies David Giard 4/4/2016