Read Details on a New PGP Vulnerability - Schneier on Security by Bruce Schneier (schneier.com)
Why is anyone using encrypted e-mail anymore, anyway? Reliably and easily encrypting e-mail is an insurmountably hard problem for reasons having nothing to do with today's announcement. If you need to communicate securely, use Signal. If having Signal on your phone will arouse suspicion, use WhatsApp.
Interesting that Bruce things email encryption is a lost cause. For reasons that are mostly about ease of use.
Details on a New PGP Vulnerability NIKON D3 D3S7474 20131207 500

Husband, father, information security professional and avid photographer living at the junction of Montgomery Township, Rocky Hill and Princeton Township, New Jersey.

Bookmarked The Definition of Security is “Without Worry" by Daniel Miessler (Daniel Miessler)
The only approach is to abandon the pure play of prevention, and move to a more mature model of resilience. Resilience is powerful precisely because it gets us to the true definition of security—being ok no matter what.
Over the years I’ve said something like that second paragraph to the CISO or security director only to receive a blank stare or admonition not to say anything like that to an executive team. It’s time for security folks to admit the truth.

My viewpoint is one I learned over the years from reading Christopher Hoff’s blog, Rational Survivability.

Without Worry NIKON D3 D3S7474 20131207 500

Husband, father, information security professional and avid photographer living at the junction of Montgomery Township, Rocky Hill and Princeton Township, New Jersey.

RSVPed Attending Cyber Secure Your Business!
Are you interested in learning how to make your business the most secure it can be?
On November 28th, along with Joshua Stone, owner of Digital Doc, I will be presenting on cyber-security. The event is hosted by the Montgomery Business Association. Josh Stone will be providing tips on online safety and privacy from a consumer perspective and I will be focused on guidance on integrating cybersecurity practices for home and business, how to identify and prioritize cybersecurity actions, and how to manage cyber risk. More information can be found on the ShopLocal Montgomery events page.

When: Tuesday November 28th, 7 PM
Where: Princeton Fitness & Wellness Center, 1225 State Rd, Princeton, New Jersey 08540
Who: Khürt Williams (Monkey Hill) and Joshua Stone (Digital Doc).

Cyber Secure Your Life! NIKON D3 D3S7474 20131207 500

Husband, father, information security professional and avid photographer living at the junction of Montgomery Township, Rocky Hill and Princeton Township, New Jersey.

  NIKON D5100  @ 35mm  , ISO 100  , 13s  , ƒ/14  on 21 April, 2015  Copyright © 2015 Khürt Williams 

Ricoh Danielson is a U.S. Army Combat Veteran of Iraq and Afghanistan and founder of (Fortitude Tech LLC). Problem statement:

There is a huge demand for infosec professionals but at the same time, many aspiring security personnel are unemployed and left to the wind due to the fact that employers and companies don’t allow them to obtain the skills needed through on-the-job training. This is what some refer to as the “skills gap.”

It’s not just the novices that are suffering through this. Many experienced workers who are looking to learn a new area of infosec are also caught in this trap. Solution statement:

Noting this gap, I took the initiative to start up EXXOTeck Training out of San Jose. There, I am bridging the gap for underemployed, unemployed, and/or learning adults who are seeking to gain real-life skill sets in cyber security. In line with market demands, we’re providing hands-on experience by bringing in world-leading experts from Cisco, AWS and other services providers to help students connect the dots.

The industry needs much more of this.

These hands-on experiences can range anywhere from creating a network and peer-conducted penetration testing to studying companies and reviewing their defensive postures. Many times, students will find themselves in a scenario where they are either conducting a security assessment or acting as a CEO. Consequently, students can learn what it means to do the job of a cyber security professional and to know what overall business impact this type of work might have.

Infosec Skills Gap NIKON D3 D3S7474 20131207 500

Husband, father, information security professional and avid photographer living at the junction of Montgomery Township, Rocky Hill and Princeton Township, New Jersey.