Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
James Blake

James Blake

Group Chief Security Officer for a leading cloud services vendor in the email risk management and compliance space. MMO/RPG geek and Harley-Davidson rider.
My week on twitter: 4 New Followers, 1 Mentions, 818 Mention Reach, 2 Retweets, 527 Retweet Reach. via https://sumall.com/myweek
Four terrible service account habits http://m.windowsitpro.com/blog...
5 Security Stories To Know Right Now http://www.checkmarx.com/2014... via @sharethis
Michaels finally confirms massive POS hack (Aaron Bros. as well) http://blogs.computerworld.com/securit... via @computerworld
My week on twitter: 3 New Followers, 2 Mentions, 1.16K Mention Reach, 1 Retweets, 1.41K Retweet Reach. via https://sumall.com/myweek
Nice short intro into CSRF and XSS: http://www.acunetix.com/blog...
One Big Threat to Cyber Security: IT Geeks Can’t Talk to Management http://www.tripwire.com/state-o...
The Security Threat Posed by Social Engineering – Blog Post - RSA Conference http://www.rsaconference.com/blogs... via @sharethis
Overview of Android Malware Analysis http://resources.infosecinstitute.com/overvie... via @infosecedu
Understanding Role Based Access Control [New Series] https://securosis.com/blog...
Back to Basics – Network Design http://stephenperciballi.blogspot.com/2014...
Bruce Schneier: Technology Magnifies Power in Surveillance Era http://threatpost.com/bruce-s...
The Best Information Security Resources on Google Plus http://www.marblesecurity.com/2014...
"Heartbleed Vulnerability: What Should You Do?" http://www.cigital.com/justice...
Configuring an SSL MITM Test Lab for Android http://www.tripwire.com/state-o...
Learn How to Speak ‘Cyber,’ Even If It Pains You: http://threatpost.com/learn-h... <- oh, and it does
Ensuring Network Security When Working with Third Party Vendors via @AlgoSec http://blog.algosec.com/2014...
Understanding Attack Surface Analytics via @tripwireinc http://www.tripwire.com/state-o...
Sophisticated Attacks Now the Norm, Not the Exception via @tripwireinc http://www.tripwire.com/state-o...
North Korea Investing Heavily in Cyber Warfare Capabilities http://www.tripwire.com/state-o...
Institute for National Security Studies (INSS) issues report into Iranian Cyber Warfare capabilities: http://www.inss.org.il/index...
My week on twitter: 3 New Followers, 2 Mentions, 435 Mention Reach, 3 Retweets, 3.87K Retweet Reach. via https://sumall.com/myweek
Zero-Day Behavioral-Based Malicious Activity Intervention using IDP http://forums.juniper.net/t5...
The insider threat is growing http://www.net-security.org/secworl...
Find out shortly if "Why Your SOCs Probably SOC: Lessons Learnt from Building the World's Largest SOCs" has got into BSides London lineup
Detecting A Surveillance State - Part 1 Hardware Implants http://blog.spiderlabs.com/2014...
Introduction to Memory Analysis with Mandiant Redline https://t.co/7FeYO3TK7U
Other ways to read this feed:Feed readerFacebook