EntRisk Technologies is a Veteran-Owned Innovative Technology Up Start entrepreneurship in Atlanta, GA currently developing Enterprise Risk Assessment/HR Security software.
Don't wanna be here? Send us removal request.
Text
Books of the Week: September 2, 2014
Books of the Week: September 2, 2014
Book of the Week September 2, 2014
The books of this week are âThe Art of Steal,â âStealing Your Life,â and âCatch Me If You Canâ by Frank Abagnale.Catch Me If You Can may ring a bell because of the Leonardo DiCaprio and Tom Hanks film directed by Steven Spielberg, with a cameo from Frank Abagnale himself. Mr. Abagnale is one of the worldâs best known social engineers, check forgers, andâŚ
View On WordPress
0 notes
Text
No Blog Today
No blog today, check back tomorrow at 9:30 AM EST
In the meantime, review some of our archived blogs.
View On WordPress
0 notes
Text
Today in Cyber Security: August 25, 2014, DDoS and Medical Breach
Today in Cyber Security: August 25, 2014, DDoS and Medical Breach
Today in Cyber Security August 25, 2014
Today is a busy day with many headlines in the IT/Cyber Security arena. We have (non-inclusive list) the Playstation disruption and DDoS, South Korea data breach, UPS Data Breach, and Community Health Systems data breach. We will discuss the Playstation disruption and Community Health Systems more thoroughly below.
Playstation disruption and DDoS
AnotherâŚ
View On WordPress
0 notes
Text
Book of the Week: August 25, 2014
Book of the Week: August 25, 2014
Book of the Week August 25, 2014
The book of this week is âGhost in the Wiresâ by Kevin Mitnick. Mr. Mitnick is one of the worldâs best known modern hackers. He is considered by some to be the âFather of Social Engineering.â This book details his journey as a fugitive from the FBI for 2 1/2 years. Note: We DO NOT condone illegal hacking, but consider this book to hold significant educationalâŚ
View On WordPress
0 notes
Text
Book of the Week: August 25, 2014
Book of the Week: August 25, 2014
Book of the Week August 25, 2014
The book of this week is âGhost in the Wiresâ by Kevin Mitnick. Mr. Mitnick is one of the worldâs best known modern hackers. He is considered by some to be the âFather of Social Engineering.â This book details his journey as a fugitive from the FBI for 2 1/2 years. Note: We DO NOT condone illegal hacking, but consider this book to hold significant educationalâŚ
View On WordPress
0 notes
Text
âWhatâs right is whatâs left if you do everything else wrong.â @robinwilliams #RIPRobinWilliams
0 notes
Link
This seems to be a step in the right direction! #compscieducation http://evpo.st/1kgVBWM
0 notes
Link
This seems to be a step in the right direction! #compscieducation http://evpo.st/1kgVBWM
0 notes
Text
Update on the Sony Playstation Network Data Breach of 2011
Update on the Sony Playstation Network Data Breach of 2011
Update on the Sony Playstation Network Data Breach of 2011 July 30, 2014
In an attack in 2011 that made the TJX (TJ Maxx, HomeGoods, and Marshals) breach seem small, Sony announced an outage for the Playstation network. The scope of the attack was 77,000,000 (77 million) users data compromised, as opposed to the 45.6 million usersâŚ
View On WordPress
0 notes
Text
New and Notable: July 29 Cyber Attack of Israel's "Iron Dome" missile defense system
New and Notable: July 29 Cyber Attack of Israelâs âIron Domeâ missile defense system
New and Notable in Security
Cyber Attack of Israelâs âIron Domeâ missile defense system
New and Notable: Cyber Attack of Israelâs âIron Domeâ missile defense system July 28, 2014
Welcome to the next installment of New and Notable, where we discuss the New and Notable trends in Information Security, IT Security, and Cyber Security. Today, we are talking the alleged Cyber Attack of Israelâs âIronâŚ
View On WordPress
0 notes
Text
Book of the Week: July 28, 2014
Book of the Week: July 28, 2014
Book of the Week July 28, 2014
The book of this week is âSecurity Engineering: A Guide to Building Dependable Distributed Systemsâ by Ross J. Anderson.Mr. Anderson is a researcher at the University of Cambridge Computer Laboratory. This book discusses all aspects of Information Security Engineering and is used as course text for numerous post-secondary courses. Topics covered are: encryption,âŚ
View On WordPress
0 notes
Text
Best Phishing Phone Call ever?
Best Phishing Phone Call ever? @michaeldell
Best Phishing Phone Call ever?
Best Phishing Phone Call ever? July 25, 2014
This could be the best phishing phone call ever! Around 6 p.m. Eastern Time and again around 9:30, I received a call on my office phone, asking if I was the Director of IT Security, to which I replied, ��Yes.â The person identified himself as Rahul from Dell Security and wanted to send me a whitepaper. I felt this was odd,âŚ
View On WordPress
0 notes
Text
Goodwill has a possible Data Breach?
Goodwill has a possible Data Breach?
Goodwill has a possible Data Breach?
Goodwill has a possible Data Breach? July 23, 2014
Per various news outlets, the Non-Profit Organization Goodwill has experienced a data breach and are working with federal investigators to gain more information. Per ABC News and the Associated Press (AP),âGoodwill operates more than 2,900 stores and takes in annual retail sales of $3.79 billion. It sellsâŚ
View On WordPress
0 notes
Text
9/11 Panelists Push for Cyber Security Legislation
9/11 Panelists Push for Cyber Security Legislation
9/11 Panelists Push for Cyber Security Legislation
9/11 Panelists Push for Cyber Security Legislation July 22, 2014
Cyber Security is certainly a concern for all sectors: manufacturing, finance, defense, and certainly technology; in the past few entries, we have covered the finance and automotive industries. Now, it seems as if the U.S. Federal government is being pressured to pass Cyber SecurityâŚ
View On WordPress
0 notes