Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
James Blake

James Blake

Group Chief Security Officer for a leading cloud services vendor in the email risk management and compliance space. MMO/RPG geek and Harley-Davidson rider.
RT @CIA: No, we don’t know where Tupac is. #twitterversary
Oi @_hoolers, we need a repeat performance...
If You Are Doing Incident Response, You Are Doing It Wrong
Annoying I'm seeing responses to @RANTForum from @ThomLangford @J4vv4D @_hoolers @GeekChickUK @FVT @sirjester when I'm no longer invited :'(
Insider Threat: from paranoia to protection via @IS_Decisions
A Roadmap for CIOs & CSOs After the Year of the Mega Breach via @SheilaJordan90
7 Things Your Boss Needs to Know About Phishing via @Cyveillance
Timing of First Known Exploits for Remote Code Execution Vulnerabilities via @MSFTSecurity
Ounce of Big Data is Worth a Pound of Defense < good comments, but most orgs can't handle little data via @a_golshan
'juice jacking' mitigations protect mobile devices while they're charging < tinfoil hats at the ready via @briankrebs
Domain Generation Algorithm (DGA) via @infosecedu <- nice tutorial with example code
Network Time Protocol (NTP): Threats and Countermeasures via @infosecedu
Mobile security and incident readiness
Microsoft launch "Interflow" a security and threat information exchange platform
Transport for London awknowledges Oyster (MIFARE) "card clash" issue when stored with other contactless cards
Hackonomics: Cybercrime's cost to business via @violetblue
0day market conspiracy theories via @feedly
Good coverage of SOC basics from @ananalytical
Why a User-Centric Approach is Required for Network Security
Just finished my B-Sides Manchester presso. It's got pirates, leprechauns and penis measurement in it - what more could you want?
Proposed Legislation Would Enable Threat Information Sharing via @tripwireinc
GCHQ legally intercepts Google, Facebook users' communications via @ZeljkaZorz
Five steps towards cyber breach preparation <- Simple steps, but amazing the amount of people who don't do the basics
On SIEM Tool and Operation Metrics <- some good starter operational metrics
Research Pays People to Download, Run Executables: via @Mike_Mimoso <- I was worried the link would be malware
Continuous Security Monitoring: Step by Step via @tripwireinc
Case Study: Complexities of “simple” malware via @sucuri_security
Other ways to read this feed:Feed readerFacebook