Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
James Blake

James Blake

Group Chief Security Officer for a leading cloud services vendor in the email risk management and compliance space. MMO/RPG geek and Harley-Davidson rider.
NSA Backdoor Part 2, BULLDOZER: And, Learn How to DIY a NSA Hardware Implant http://resources.infosecinstitute.com/nsa-bio... via @infosecedu
The Media’s Guide to Information Security FUD & Fiction http://www.tripwire.com/state-o...
Legal Divide Between Security Research and Cybercrime Remains Murky: http://threatpost.com/legal-d...
“Stop The Pain” Thinking vs the Use Case Thinking http://www.infosecisland.com/blogvie...
If he'd said "Observer effect" I'd have got it in one....Consider the Hawthorne Effect for Big Data https://t.co/j8e5eixvPS
86% of hackers don't worry about the repercussions: http://www.net-security.org/secworl... <- deterrence, what deterrence?
New GPO Admin Templates Released Now Include IE ActiveX Blocking Management http://windowsitpro.com/windows... via @WindowsITPro
The Rise and Fall of Enterprise Security http://blogs.bromium.com/2014...
Why hackers won't be able to hijack your next flight - nice hype, no reality http://www.theregister.co.uk/2014... via @theregister
Windows Security Authenticated Users: How to start taking internal security more seriously http://www.isdecisions.com/blog...
Social Engineering a telemarketer - PMSL: https://t.co/EAcry0xKWO
SANS offering free Cybersecurity training through it's Cyberaces program @SANSInstitute - http://www.cyberaces.org/courses...
Ethics of Active Counter Measures via @RSAsecurity https://t.co/RAOu9gkhQ7
why*
The “Patch and Pray” Approach to Cybersecurity - or way Vulnerability-led security is a race to the end of the budget http://www.bloginfosec.com/2014...
Detect & Respond, some good points http://www.net-security.org/article...
The Real Cost of Control System Cyber Security – And it isn’t Cheap http://www.infosecisland.com/blogvie...
Dozens of Vulnerabilities in Firmware Shows Lack of Proper Security Practices http://www.tripwire.com/state-o...
Dan Geer: Cybersecurity as Realpolitik https://t.co/5N1dJrYbHy
Navigating the Future With Web Data - organising the Web for analysis not search: https://t.co/dTOb3qJ2cR via @RecordedFuture
Poor Communication Leads to Defeat on the Network Security Battlefield : http://vpnhaus.ncp-e.com/2014...
Why Your Enterprise Most Likely Doesn't Have a Zero-Day Problem http://www.infosecisland.com/blogvie...
Using Sysinternals System Monitor (Sysmon) in a Malware Analysis Lab | SANS Institute http://digital-forensics.sans.org/blog...
RT @violetblue: My friend's custom #DEFCON shirt, "Say cyber one more time" https://twitter.com/violetb...
The 5 stages of vulnerability management http://www.infosecisland.com/blogvie...
Videos from B-Sides Cleveland http://www.irongeek.com/i...
Other ways to read this feed:Feed readerFacebook