Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
James Blake

James Blake

Group Chief Security Officer for a leading cloud services vendor in the email risk management and compliance space. MMO/RPG geek and Harley-Davidson rider.
RT @CIA: No, we don’t know where Tupac is. #twitterversary
Oi @_hoolers, we need a repeat performance... https://twitter.com/jimmybl...
If You Are Doing Incident Response, You Are Doing It Wrong http://integriography.wordpress.com/2014...
Annoying I'm seeing responses to @RANTForum from @ThomLangford @J4vv4D @_hoolers @GeekChickUK @FVT @sirjester when I'm no longer invited :'(
Insider Threat: from paranoia to protection http://www.isdecisions.com/blog... via @IS_Decisions
A Roadmap for CIOs & CSOs After the Year of the Mega Breach http://www.darkreading.com/attacks... via @SheilaJordan90
7 Things Your Boss Needs to Know About Phishing https://t.co/w9FTjTcze9 via @Cyveillance
Timing of First Known Exploits for Remote Code Execution Vulnerabilities http://blogs.technet.com/b... via @MSFTSecurity
Ounce of Big Data is Worth a Pound of Defense http://www.infosecisland.com/blogvie... < good comments, but most orgs can't handle little data via @a_golshan
'juice jacking' mitigations protect mobile devices while they're charging http://krebsonsecurity.com/2014... < tinfoil hats at the ready via @briankrebs
Domain Generation Algorithm (DGA) http://resources.infosecinstitute.com/domain-... via @infosecedu <- nice tutorial with example code
Network Time Protocol (NTP): Threats and Countermeasures http://resources.infosecinstitute.com/network... via @infosecedu
Mobile security and incident readiness http://www.net-security.org/secworl...
Microsoft launch "Interflow" a security and threat information exchange platform http://technet.microsoft.com/en-us...
Transport for London awknowledges Oyster (MIFARE) "card clash" issue when stored with other contactless cards http://tfl.gov.uk/fares-a...
Hackonomics: Cybercrime's cost to business http://www.zdnet.com/hackono... via @violetblue
0day market conspiracy theories http://blog.erratasec.com/2014... via @feedly
Good coverage of SOC basics from @ananalytical http://ananalyticalapproach.bl...
Why a User-Centric Approach is Required for Network Security https://plus.google.com/+JamesB... https://twitter.com/jimmybl...
Just finished my B-Sides Manchester presso. It's got pirates, leprechauns and penis measurement in it - what more could you want?
Proposed Legislation Would Enable Threat Information Sharing http://www.tripwire.com/state-o... via @tripwireinc
GCHQ legally intercepts Google, Facebook users' communications http://www.net-security.org/secworl... via @ZeljkaZorz
Five steps towards cyber breach preparation http://www.net-security.org/article... <- Simple steps, but amazing the amount of people who don't do the basics
On SIEM Tool and Operation Metrics http://www.infosecisland.com/blogvie... <- some good starter operational metrics
Research Pays People to Download, Run Executables: http://threatpost.com/researc... via @Mike_Mimoso <- I was worried the link would be malware
Continuous Security Monitoring: Step by Step http://www.tripwire.com/state-o... via @tripwireinc
Case Study: Complexities of “simple” malware http://blog.sucuri.net/2014... via @sucuri_security
Other ways to read this feed:Feed readerFacebook