cyber50.org
Articles | Cyber:50
http://cyber50.org/articles
Skip to main content. Ars Technica - Risk Assessment. Hints suggest an insider helped the NSA Equation Group hacking tools leak. How the NSA snooped on encrypted Internet traffic for a decade. Cisco confirms NSA-linked zeroday targeted its firewalls for years. Confirmed: hacking tool leak came from omnipotent NSA-tied group. Snowden speculates leak of NSA spying tools is tied to Russian DNC hack. Group claims to hack NSA-tied hackers, posts exploits as proof. New York Times - Cybersecurity.
cyber50.org
Bulletin Board | Cyber:50
http://cyber50.org/bulletin-board
Skip to main content. Have something you'd like to post to the Bulletin Board? CyberPatriot VI Hawaii Kickoff. Call for mentors. Hawaii High Schools are always in need of mentors to share their cyber security knowledge and technical skills with local students. If you are interested in becoming a mentor, this event is a good starting point. 22 August 2013, 6:00pm. Doors open at 5:30). Honolulu, HI 96819. All attendees must register to attend the event. University of Hawaii Cyber Range. Sunday March 3rd: 8...
cyber50.org
News | Cyber:50
http://cyber50.org/news
Skip to main content. Training the Next Generation of Cybersecurity Warriors. Referentia's own Michael Herr participates in first CyberPatriot Boot Camp at Honolulu Community College. Http:/ www.hawaii.edu/news/article.php? Read more about Training the Next Generation of Cybersecurity Warriors. Escalation in Computer Hacking Threats Prompts Referentia to Launch Cyber:50 Website. Cyber:50 is a community initiative encouraging families, and businesses to collaborate for a cyber safe Hawaii.
cyber50.org
Application Security with Terumi Laskowsky | Cyber:50
http://cyber50.org/application-security
Skip to main content. Submissions for this form are closed. Application Security with Terumi Laskowsky. On Mon, 02/11/2013 - 10:19. Note: Due to some scheduling conflicts, the speaker for this week has changed! If you've already registered for the previous speaker, you're all set for this one! Terumi Laskowsky is CEO and Lead Consultant, Pathfinders Japan Ltd. CISSP, CEH, MCT, HNLP Certified Coach, MBA. Terumi served as a Military Police officer in the U.S. Army. Her IT expertise is in IT Sec...Terumi is...
cyber50.org
Cybersecurity Tools | Cyber:50
http://cyber50.org/tools
Skip to main content. Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. For security practitioners who assess complex enterprise networks for security flaws and compliance issues, Nessus is the world's most widely-deployed vulnerability and configuration assessment product. OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. Simplifies network...
cyber50.org
LifeCycle of Threat Response | Cyber:50
http://cyber50.org/lifecycle-of-threat-response
Skip to main content. Submissions for this form are closed. LifeCycle of Threat Response. On Wed, 09/05/2012 - 11:12. There will be a discussion following the presentation. Anthony K. Giandomenico is Director of Business Solutions and Marketing responsible for creating solutions for customers utilizing Referentia’s smartgrid and cybersecurity technologies. Mr. Giandomenico and his team assess the needs of companies and government agencies then develop customized solutions to address the vario...155 Kapal...
cyber50.org
The Village Idiot and your Organization | Cyber:50
http://cyber50.org/village-idiot
Skip to main content. Submissions for this form are closed. The Village Idiot and your Organization. On Tue, 08/13/2013 - 18:01. The event will be held on 17 September 2013, at 6:00pm. Doors open at 5:30. 155 Kapalulu Place, Suite 200. Honolulu, HI 96819. Registration has closed for this event! Cyber:50 is Sponsored by. Cybersecurity Risk Management and the New Cyber Framework from NIST. The Village Idiot and Your Organization. Exploit Kits / Packs. Creating a Defensible Network In the Age of BYOD.
cyber50.org
Creating a Defensible Network In the Age of BYOD with Andrew Benhase | Cyber:50
http://cyber50.org/creating-a-defensible-network
Skip to main content. Submissions for this form are closed. Creating a Defensible Network In the Age of BYOD with Andrew Benhase. On Mon, 01/28/2013 - 14:54. Andrew will discuss the evolving cyber threat landscape and what that means to your network. Specifically he will focus on the importance of creating a defensible network that can withstand the increasing demands of new business requirements such as BYOD and the use of collaborative applications. 155 Kapalulu Place, Suite 200. Honolulu, HI 96819.
cyber50.org
Blog Posts | Cyber:50
http://cyber50.org/blog
Skip to main content. Oct 3 Adobe Systems Security Breach Announcement - Ramifications and Action. Web Application Security Testing. New Year’s Blog Predicting Trends in CyberSecurity. When is an outsider cyber threat worse than the worst-case insider threat? How APTs are like Insider Threats or not! Shamoon Wiper: The most damaging corporate attack - Did you miss it? What to expect from the Obama administration on Cybersecurity. Cyber:50 is Sponsored by. The Village Idiot and Your Organization.
cyber50.org
Exploit Automation – Exploit Kits/Packs | Cyber:50
http://cyber50.org/exploit-automation
Skip to main content. Submissions for this form are closed. Exploit Automation Exploit Kits/Packs. On Tue, 06/04/2013 - 10:47. The event will be held on 2 July 2013, at 6:00pm. Doors open at 5:30. 155 Kapalulu Place, Suite 200. Honolulu, HI 96819. Cyber:50 is Sponsored by. Cybersecurity Risk Management and the New Cyber Framework from NIST. The Village Idiot and Your Organization. Exploit Kits / Packs. Creating a Defensible Network In the Age of BYOD. LifeCycle of Threat Response.
SOCIAL ENGAGEMENT