Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
James Blake

James Blake

Group Chief Security Officer for a leading cloud services vendor in the email risk management and compliance space. MMO/RPG geek and Harley-Davidson rider.
The 5 stages of vulnerability management http://www.infosecisland.com/blogvie...
Videos from B-Sides Cleveland http://www.irongeek.com/i...
Consolidated mailing list on major information security conferences. Not sure how 'spammy' it is: http://www.concise-courses.com/confere...
Really good links for analytics visualisation from @SecViz http://secviz.org/content...
Good article on the myths around Machine Learning in Information Security via @ErickaChick http://www.darkreading.com/analyti...?
RT @NakedSecurity: Hacker turns ATM into ‘Doom’ arcade game http://nakedsecurity.sophos.com/2014...
Good article on the myths around Machine Learning in Information Security via @ErickaChick http://www.darkreading.com/default...
Good article of the myths around Machine Learning in Information Security via @ErickaChick http://www.darkreading.com/default...
How to source threat intelligence via @ananalytical http://www.computerweekly.com/opinion...
Vulnerability Management - "Just turn it off" via @tripwireinc http://www.tripwire.com/state-o...
Things that aren't risk assessments: http://blogs.gartner.com/ben-tom... via @Gartner_inc
1/3 of ex-employees still accessing company data: http://www.isdecisions.com/blog...
"Rickmote" box Rickrolls Chromecast owners - WANT!! http://nakedsecurity.sophos.com/2014...
How MSSP's Utilize Open Source Intelligence - Alert Logic https://t.co/nia1koJel0 via @alertlogic
Four Steps to Successfully Implementing Security into a Continuous Development Shop http://blog.veracode.com/2014... via @Veracode
RT @CIA: No, we don’t know where Tupac is. #twitterversary
Oi @_hoolers, we need a repeat performance... https://twitter.com/jimmybl...
If You Are Doing Incident Response, You Are Doing It Wrong http://integriography.wordpress.com/2014...
Annoying I'm seeing responses to @RANTForum from @ThomLangford @J4vv4D @_hoolers @GeekChickUK @FVT @sirjester when I'm no longer invited :'(
Insider Threat: from paranoia to protection http://www.isdecisions.com/blog... via @IS_Decisions
A Roadmap for CIOs & CSOs After the Year of the Mega Breach http://www.darkreading.com/attacks... via @SheilaJordan90
7 Things Your Boss Needs to Know About Phishing https://t.co/w9FTjTcze9 via @Cyveillance
Timing of First Known Exploits for Remote Code Execution Vulnerabilities http://blogs.technet.com/b... via @MSFTSecurity
Ounce of Big Data is Worth a Pound of Defense http://www.infosecisland.com/blogvie... < good comments, but most orgs can't handle little data via @a_golshan
'juice jacking' mitigations protect mobile devices while they're charging http://krebsonsecurity.com/2014... < tinfoil hats at the ready via @briankrebs
Domain Generation Algorithm (DGA) http://resources.infosecinstitute.com/domain-... via @infosecedu <- nice tutorial with example code
Other ways to read this feed:Feed readerFacebook