Doctor Chaos

The 5 Biggest Cybersecurity Threats of 5 Industries

Doctor Chaos

Unaddressed cybersecurity threats can cause lost profits, regulatory fines and missed opportunities. Plus, as company leaders scramble to recover from attacks, making progress often takes weeks or months, severely disrupting business operations.

The Grey Brick That Changed the World: The Nintendo Game Boy

Doctor Chaos

This week marked an important anniversary; Nintendo’s original Game Boy turned 31. The monochrome system, or more accurately a yellowish and 4 shades of grey system, may have been one of the most significant devices in the 20th century. The 8-bit system was released to the world on April 21st, 1989.

System 192
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Podcast: Predator, Hunter, Prey

Doctor Chaos

Click Here to listen to the podcast on SoundCloud. We are honored to have Dr. Alex Tarter, CTO of Thales UK and co-founder of TurgenSec, and Breaches.UK on our podcast. Alex is a bit of a legend in the CISO space.

Podcast: A Long Week

Doctor Chaos

Tony G and Aamir Lakhani discuss their long week of investigating remote work cyber attacks, the craziness of ransomware, the Colonial Pipeline attack, and a debate on Cobalt Strike being a tool made for attackers or being used by attackers.

Tools 130

A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

Podcast: A Long Week

Doctor Chaos

Tony G and Aamir Lakhani discuss their long week of investigating remote work cyber attacks, the craziness of ransomware, the Colonial Pipeline attack, and a debate on Cobalt Strike being a tool made for attackers or being used by attackers.

Tools 130

5 Critical Regulations for Cyber Security Compliance

Doctor Chaos

Cyber security compliance is more important than ever. With new technologies and digital connections happening every day, small and medium-sized businesses (SMBs) must properly comply with cyber security regulations across the board. Which ones, though, should you focus on the most?

The Grey Brick That Changed the World: The Nintendo Game Boy

Doctor Chaos

This week marked an important anniversary; Nintendo’s original Game Boy turned 31. The monochrome system, or more accurately a yellowish and 4 shades of grey system, may have been one of the most significant devices in the 20th century. The 8-bit system was released to the world on April 21st, 1989.

System 130

Exchanging Web Shells

Doctor Chaos

Tony G and Aamir Lakhani discuss the Microsoft Exchange Zero-Day vulnerabilities. Click here to listen to the podcast on Soundcloud or find us on your favorite podcast app. Podcast

The Proper Way to Watch Star Wars

Doctor Chaos

Many of us have stress in our lives. We have our jobs to worry about, we need to think about our retirement, and we have to figure out what the health care law means to us. However, a few of us know there are more immediate concerns that must be dealt with.

153
153

How Real-Time Technologies Are Helping Protect Vulnerable Energy Assets

Doctor Chaos

As the world increasingly relies on technology, the energy sector’s role becomes more critical. A disruption in the power grid that delivers electricity to businesses and homes could be devastating for any infrastructure and services in an area.

Energy 141

The History of the Word "Hacker"

According to one of the best English etymological dictionaries available, the word "hacker", with the sense of evil/good and brilliant computer programmer, was born in the halls of MIT. This fact alone reminds us that culture and words begin in actual places. At that time, to hack code, or hack out code, had a negative connotation. Where did this come from? Read this eBook to learn how the word "hacker" has evolved.

What Is Digital Forensics in Cybersecurity and Why Is It Important?

Doctor Chaos

Cybersecurity is a vast sector that incorporates several subfields. While protecting invaluable data and digital assets, it’s essential to have numerous professionals working on cybersecurity at all times.

Exchanging Web Shells

Doctor Chaos

Tony G and Aamir Lakhani discuss the Microsoft Exchange Zero-Day vulnerabilities. Click here to listen to the podcast on Soundcloud or find us on your favorite podcast app. Podcast

What Is Digital Forensics in Cybersecurity and Why Is It Important?

Doctor Chaos

Cybersecurity is a vast sector that incorporates several subfields. While protecting invaluable data and digital assets, it’s essential to have numerous professionals working on cybersecurity at all times.

Zombie Speed 101: They are getting faster

Doctor Chaos

They say the strong survive. How does that apply when you are dead? The Zombie Apocalypse is among us. What are your chances of making it? It really depends on what types of Zombies you are “lucky” enough to encounter.

Study 141

Beware of the Surge in Covid-19 Vaccine Phishing Scams

Doctor Chaos

As the world makes steady progress towards ending the pandemic, the road ahead is still a long one. Previously unforeseen obstacles can pop up at any time and skew the trajectory of how the world handles Covid-19. One obstacle, in particular, that is on the rise currently is phishing scams.

Realizing the Benefits of Automated Machine Learning

How are organizations using machine learning and artificial intelligence (AI) to derive business value? Renowned author and professor Tom Davenport explains the rise of automated machine learning, its benefits, and success stories from businesses that are already using it.

Why Threat Actors Continue to Rely on Cyber Fraud

Doctor Chaos

While 2020 has come and gone, many of last year’s cyber fraud problems will continue into at least mid-2021. Cybercriminals will focus on maximizing their profits, using a traditional cost-benefit analysis to decide on the best attack vector.

Why Threat Actors Continue to Rely on Cyber Fraud

Doctor Chaos

While 2020 has come and gone, many of last year’s cyber fraud problems will continue into at least mid-2021. Cybercriminals will focus on maximizing their profits, using a traditional cost-benefit analysis to decide on the best attack vector.

I'm a C I Double S P (CISSP Parody)

Doctor Chaos

Think you know what being a CISSP is all about? Not all CISSP's are equal, some are more equal than others! link]. Off-Topic

130
130

I'm a C I Double S P (CISSP Parody)

Doctor Chaos

Think you know what being a CISSP is all about? Not all CISSP's are equal, some are more equal than others! link]. Off-Topic

130
130

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Cybersecurity Career Opportunities in Threat Intelligence

Doctor Chaos

[link]. MEDIA

Media 130

Cybersecurity Career Opportunities in Threat Intelligence

Doctor Chaos

[link]. MEDIA

Media 130

Security Vulnerabilities Generated by COVID-19 and How to Address Them

Doctor Chaos

Thanks to COVID-19 and the need to social-distance from one another, many companies shifted rapidly to remote operations. Teams that used to work side by side had to move to a home office or remote location.

Security Vulnerabilities Generated by COVID-19 and How to Address Them

Doctor Chaos

Thanks to COVID-19 and the need to social-distance from one another, many companies shifted rapidly to remote operations. Teams that used to work side by side had to move to a home office or remote location.

Building Evolvable Architectures

Speaker: Dr. Rebecca Parsons, CTO of ThoughtWorks

The software development ecosystem exists in a state of dynamic equilibrium, where any new tool, framework, or technique leads to disruption and the establishment of a new equilibrium. Predictability is impossible when the foundation architects plan against is constantly changing in unexpected ways. It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans.

Mobile Security should be your top concern

Doctor Chaos

The world is much smaller than it was thirteen years ago. In 2007 Steve Jobs announced the Apple iPhone. It was an innovative product because it brought mobile Internet into the pockets of millions of people. Smartphones were in existence before the iPhone.

Mobile 130

Mobile Security should be your top concern

Doctor Chaos

The world is much smaller than it was thirteen years ago. In 2007 Steve Jobs announced the Apple iPhone. It was an innovative product because it brought mobile Internet into the pockets of millions of people. Smartphones were in existence before the iPhone.

Mobile 130

Podcast: What is XDR?

Doctor Chaos

Tony G and Dr. Chaos return to discuss what is XDR. Is it hype? Is it more than repackaged tools? Let's break down the new industry buzzword. Click here to listen directly on SoundCloud

Tools 130

Podcast: What is XDR?

Doctor Chaos

Tony G and Dr. Chaos return to discuss what is XDR. Is it hype? Is it more than repackaged tools? Let's break down the new industry buzzword. Click here to listen directly on SoundCloud

Tools 130

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Clark-Wilson Security Model

Doctor Chaos

The Clark-Wilson security model is based on preserving information integrity against the malicious attempt of tampering with data.

Clark-Wilson Security Model

Doctor Chaos

The Clark-Wilson security model is based on preserving information integrity against the malicious attempt of tampering with data.

Scammers Posing as Board of Elections to Obtain Social Security Numbers

Doctor Chaos

Everybody in the USA that used the mail-in or dropbox voting option, be on alert that there are criminals lurking about with the goal of abusing the confusion going on with the US election the next few days.

Social 130

Scammers Posing as Board of Elections to Obtain Social Security Numbers

Doctor Chaos

Everybody in the USA that used the mail-in or dropbox voting option, be on alert that there are criminals lurking about with the goal of abusing the confusion going on with the US election the next few days.

Social 130

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

7 Cybersecurity Testing Tools and Apps for Network Security in 2021

Doctor Chaos

The role of the cybersecurity professional has never been more critical. Mass digitization has made every company a tech business, and cybercriminals have taken full advantage of this movement. New threats arise every day, but there’s also an abundance of cybersecurity testing tools at your disposal.

Tools 141

Baselines and Anomaly Detection – The Future of Security Capabilities

Doctor Chaos

In a previous lesson, I pointed out that there are three essential ways security tools detect threats. Those methods are signature-based, behavior, and anomaly detection. Most security tools use a combination of one or more of these capabilities to detect threats.

Tools 130

Baselines and Anomaly Detection – The Future of Security Capabilities

Doctor Chaos

In a previous lesson, I pointed out that there are three essential ways security tools detect threats. Those methods are signature-based, behavior, and anomaly detection. Most security tools use a combination of one or more of these capabilities to detect threats.

Tools 130

Why is my Network Down?

Doctor Chaos

Over the last few days, many of us in the USA have experienced network outages. I’m not sure about you, but I have become the default “IT Support Guy” at my house meaning when the network goes down, my family starts throwing tomatoes at me while they blame me for the outage.

The Complete Guide to Distributed Tracing

Distributed tracing is a diagnostic technique that reveals how a set of services coordinate to handle individual user requests. Distributed tracing helps enable loosely coupled work across teams for fast, independent problem-solving.