Raymond Pompon's Blog, page 11

May 10, 2018

F5 Labs - How Secure Are Your Third-Party Web Apps?



Essential apps are holding essential data, and they’re out of direct oversight. Obviously, it’s not enough to just trust that things are going to be fine...

How Secure Are Your Third-Party Web Apps?
 •  0 comments  •  flag
Share on Twitter
Published on May 10, 2018 09:48

F5 Labs - Breach Costs Are Rising with the Prevalence of Lawsuits


We believe organizations are drastically under estimating their true breach costs...
 
F5 Labs - Breach Costs Are Rising with the Prevalence of Lawsuits

 •  0 comments  •  flag
Share on Twitter
Published on May 10, 2018 09:46

April 9, 2018

Helpnet Security: The eternal struggle: Security versus users


There’s an old joke that a job in security is a safe place to be grumpy. From what I’ve seen over my career, that is often true. Security people seem to cherish their reputation for being pessimistic and untrusting.

Read the rest at Helpnet Security: The eternal struggle: Security versus users



 •  0 comments  •  flag
Share on Twitter
Published on April 09, 2018 12:19

March 27, 2018

February 25, 2018

Helpnet Security Blog - Discover hidden cybersecurity talent to solve your hiring crisis

Discover hidden cybersecurity talent to solve your hiring crisis
Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to hunt beyond the fields we know. To borrow a phrase from the ever-logical Mr. Spock, CISOs need to embrace Infinite Diversity in Infinite Combinations. By this I mean embracing diversity not only of bodies but of talents and experiences.
Read the rest at Helpnet Security
 •  0 comments  •  flag
Share on Twitter
Published on February 25, 2018 11:48

Forthcoming talk - Delaware InfraGard - IoT Botnets

DELAWARE INFRAGARD CHAPTER - March 2018 - Conquering the New Threats

The Hunt for IoT That Threatens Our Modern Way of Life – Ray Pompon

Fri, March 16, 2018
8:00 AM – 12:00 PM ED

Delmarva Conference Center,
4100 South Wakefield Drive
Newark, DE 19702

https://www.eventbrite.com/e/delaware-infragard-chapter-march-2018-conquering-the-new-threats-tickets-43305888077
 •  0 comments  •  flag
Share on Twitter
Published on February 25, 2018 11:46

Forthcoming RSA talk - Swimming in a Sea of Enemies—The Dilemmas of the Threat Researcher

Swimming in a Sea of Enemies—The Dilemmas of the Threat Researcher

April 18, 2018 | 3:00 pm - 3:45 pm

Threat researchers can find themselves in dicey situations they are unprepared for. This talk will discuss actual ethical and legal dilemmas of threat researchers including consorting with and deceiving criminals, groping thru stolen personal data, turning a blind eye to criminal activity, wandering into compromised systems, and the ultimate worse case: being corrupted and arrested by the FBI.


https://www.rsaconference.com/events/us18/agenda/sessions/9132-Swimming-in-a-Sea-of-Enemies%E2The-Dilemmas-of-the-Threat-Researcher
 •  0 comments  •  flag
Share on Twitter
Published on February 25, 2018 11:42

January 30, 2018

January 14, 2018

Radio Interview: A Tale From the Early Days Of Busting Hackers

On NPR station on KPLU KNKX -

A Tale From the Early Days Of Busting Hackers  http://knkx.org/post/tale-early-days-busting-hackers  In the late 90s and early 2000s, a lot of people were still figuring out this whole internet business.
As is often the case, way out ahead of the learning curve were the cyber-criminals, and law enforcement had some catching up to do.
The FBI often relied on the knowledge of private security professionals. So in 2000, they contacted a Seattle expert named Ray Pompon, and recruited him to go undercover as part of a sting operation. Pompon shared his story with host Gabriel Spitzer.
 •  0 comments  •  flag
Share on Twitter
Published on January 14, 2018 09:16