Category: Infosec

October 10th, 2017 by John

Title: “A Corporate Guide to Surviving Cyberwarfare Through Cyber Resiliency”

My presentation from Hacker Halted – Atlanta, GA – October 9, 2017

Please download (PDF): http://johndjohnson.com/resources/JOHNSON.HHALTED.OCT2017.pdf

Posted in Infosec, Presentations Tagged with: , , , , , ,

July 31st, 2017 by John

(via POLITICO) Senate lawmakers will mark up bills this week aimed at boosting cyber skills among small businesses and expanding the cyber workforce more broadly. On Wednesday, the Small Business Committee will consider legislation that would require workers at small business development centers to be certified in cyber training, and the Commerce Committee will consider a bill to expand cyber scholarships to people pursuing associate’s degrees. The scholarships bill would also create a National Science Foundation study on the success of the cyber scholarship recruiting program. Scholarships for young cyber professionals have emerged as a key tool to fill what experts say is an alarming and growing workforce shortage. Rep. Jim Langevin, co-chair of the Congressional Cybersecurity Caucus, recently introduced an amendment to the 2018 Pentagon funding bill that would add money to DoD’s own cyber scholarship initiative. Read More

Posted in Community, Infosec

June 30th, 2017 by John

Posted in Infosec, Law and Regulations, Privacy

June 12th, 2017 by John

Security researchers at Check Point have claimed that a single adware malware is infecting as many as 250 million PCs worldwide.

Posted in Exploits & Attacks, Infosec

June 9th, 2017 by John

Full data enrichment profiles for more than 200 million people have been placed up for sale on the Darknet. The person offering the files claims the data is from Experian, and is looking to get $600 for everything.

Details of this incident came to Salted Hash via the secure drop at Peerlyst, where someone uploaded details surrounding the sale and the data. The data were first vetted by the technical review board at Peerlyst, who confirmed its legitimacy. Once it was cleared by the technical team, a sample of the data was passed over to Salted Hash for additional verification and disclosure… Read More

Posted in Criminal, Infosec, Privacy

June 2nd, 2017 by John

Where are the biggest threats coming from?

Posted in Exploits & Attacks, Infosec, Nation State