Ron Tafoya's Blog

Cyber Security Topics

Menu
  • Home

Category: Category: Security

A Quick Comparison of SAST and DAST Code Scanning.

May 10, 2023
 |  No Comments
 |  Security

I wrote a short summary of the difference between SAST and DAST tools for some of my peers and thought It […]

Read More →

Article 4 – Cyber Security and Risk Management

January 11, 2021
 |  No Comments
 |  Risk Management, Security

Other Elements Necessary for the Disaster Recovery Plan My previous three articles cover the Business Impact Assessment, Threat Assessment, and Disaster […]

Read More →

Article 3 – Cyber Security and Risk Management

January 8, 2021
 |  No Comments
 |  Risk Management, Security

The Disaster Incident Response Team My previous two articles have set the stage for formulation of the disaster Incident Response Team. […]

Read More →

Article 2 – Cyber Security and Risk Management

January 6, 2021
 |  No Comments
 |  Risk Management, Security, Uncategorized

In the previous article we begin to gather information on critical dependencies and processes. In order to fully document these items, […]

Read More →

Cyber Security and Risk Management

January 5, 2021
 |  No Comments
 |  Risk Management, Security

Understanding Your Business Risk In the past, I have had to review business plans for entities wishing to receive economic development […]

Read More →

Mis ideas sobre seguridad cibernética 2019

April 4, 2019
 |  No Comments
 |  ciberseguridad, Security

Me gustaría acreditar Lic. Daniel Salazar Llerenas , Oficial de Seguridad en BANSI S.A, por su asistencia editorial y de traducción. […]

Read More →

My Insights into Cyber Security 2019

 |  No Comments
 |  Security

Some interesting related items that affect cyber security in 2019.

Read More →

Some insights on Phishing, Smishing and Vishing

April 2, 2019
 |  No Comments
 |  Security, Uncategorized

It looks like it is going to be a very busy year for cyber security people. Phishing (email solicitations with malicious […]

Read More →

Can we build an Immune System for the Product Body?

April 14, 2015
 |  No Comments
 |  Security

Back Ground Could a model or adaptation of the human immune system be used to build a better security system for […]

Read More →

Cyber Security – The Internet of Things and Where Are We Headed?

April 3, 2014
 |  No Comments
 |  Security

We continue to evolve to a wide distributed system of devices and interconnections.  This evolution requires a corresponding evolution in our […]

Read More →

Cyber Security – How Vulnerable Are We and Where Are We Headed?

November 1, 2013
 |  No Comments
 |  Security, Uncategorized

How Vulnerable Are We and Where Are We Headed? I recently read a couple of articles that started me thinking again […]

Read More →

How Secure is Your Wireless?

September 13, 2013
 |  No Comments
 |  Security

The courts have recently decided that sniffing data from open wireless networks is not wiretapping.  In view of this decision, I […]

Read More →

When does a cyberattack warrant armed response?

August 3, 2013
 |  No Comments
 |  Security

This is a follow-up posting to my previous posts on “First Strikes in Cyberwar”, “Learn APT Remediation Basics” and “The Realities […]

Read More →

A Review of the Keynote Addresses from the BlackHat 2013 Conference

August 2, 2013
 |  No Comments
 |  Security

I attended last week’s BlackHat 2013 Conference and wanted to share my thoughts on the keynote addresses Alexander Keynote Address You […]

Read More →

Preventative Actions for Debit/Credit Card Theft

July 8, 2013
 |  No Comments
 |  Identity Theft, Privacy, Security

I thought I was pretty good at monitoring my credit card and debit card transactions,  but I was very dismayed to […]

Read More →

Posts navigation

1 2 Next

Recent Posts

  • Social Engineering and You
  • An Argument for Performing Intelligent Fuzzing on your custom applications
  • A Quick Comparison of SAST and DAST Code Scanning.
  • Article 4 – Cyber Security and Risk Management
  • Article 3 – Cyber Security and Risk Management

Recent Comments

    Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 102 other subscribers

    Archives

    • June 2023
    • May 2023
    • January 2021
    • March 2020
    • April 2019
    • November 2016
    • April 2015
    • January 2015
    • August 2014
    • June 2014
    • May 2014
    • April 2014
    • November 2013
    • September 2013
    • August 2013
    • July 2013
    • June 2013
    • February 2013
    • January 2013
    • November 2012
    • September 2012
    • August 2012
    • June 2012
    • May 2012

    Categories

    • ciberseguridad
    • cybersecurity
    • Identity Theft
    • Privacy
    • Risk Management
    • Security
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    SKT Secure