Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
James Blake

James Blake

Group Chief Security Officer for a leading cloud services vendor in the email risk management and compliance space. MMO/RPG geek and Harley-Davidson rider.
My week on twitter: 3 New Followers, 2 Mentions, 1.16K Mention Reach, 1 Retweets, 1.41K Retweet Reach. via https://sumall.com/myweek
Nice short intro into CSRF and XSS: http://www.acunetix.com/blog...
One Big Threat to Cyber Security: IT Geeks Can’t Talk to Management http://www.tripwire.com/state-o...
The Security Threat Posed by Social Engineering – Blog Post - RSA Conference http://www.rsaconference.com/blogs... via @sharethis
Overview of Android Malware Analysis http://resources.infosecinstitute.com/overvie... via @infosecedu
Understanding Role Based Access Control [New Series] https://securosis.com/blog...
Back to Basics – Network Design http://stephenperciballi.blogspot.com/2014...
Bruce Schneier: Technology Magnifies Power in Surveillance Era http://threatpost.com/bruce-s...
The Best Information Security Resources on Google Plus http://www.marblesecurity.com/2014...
"Heartbleed Vulnerability: What Should You Do?" http://www.cigital.com/justice...
Configuring an SSL MITM Test Lab for Android http://www.tripwire.com/state-o...
Learn How to Speak ‘Cyber,’ Even If It Pains You: http://threatpost.com/learn-h... <- oh, and it does
Ensuring Network Security When Working with Third Party Vendors via @AlgoSec http://blog.algosec.com/2014...
Understanding Attack Surface Analytics via @tripwireinc http://www.tripwire.com/state-o...
Sophisticated Attacks Now the Norm, Not the Exception via @tripwireinc http://www.tripwire.com/state-o...
North Korea Investing Heavily in Cyber Warfare Capabilities http://www.tripwire.com/state-o...
Institute for National Security Studies (INSS) issues report into Iranian Cyber Warfare capabilities: http://www.inss.org.il/index...
My week on twitter: 3 New Followers, 2 Mentions, 435 Mention Reach, 3 Retweets, 3.87K Retweet Reach. via https://sumall.com/myweek
Zero-Day Behavioral-Based Malicious Activity Intervention using IDP http://forums.juniper.net/t5...
The insider threat is growing http://www.net-security.org/secworl...
Find out shortly if "Why Your SOCs Probably SOC: Lessons Learnt from Building the World's Largest SOCs" has got into BSides London lineup
Detecting A Surveillance State - Part 1 Hardware Implants http://blog.spiderlabs.com/2014...
Introduction to Memory Analysis with Mandiant Redline https://t.co/7FeYO3TK7U
Attacking the ROI of Advanced Persistent Threats http://www.infosecisland.com/blogvie...
So what actually is the risk from mobile malware? - from RSA Blog: https://t.co/iWtknTqRcU
So What *Is* the Risk of Mobile Malware? https://t.co/8uSUipkf2n
Can we test protection against targeted attacks? http://nakedsecurity.sophos.com/2014...
Other ways to read this feed:Feed readerFacebook