Security Minded - from Kai the Security Guy

Some thoughts on security (and other stuff) from a Microsoft security professional

Browse by Tags

Related Posts
  • Blog Post: 2008 Crimes Against Children Conference

    Last week I had the honor of attending the 20th Annual Crimes Against Children conference, hosted by the Dallas Children's Advocacy Center and the Dallas Police Department . It is billed as “ Providing Professionals the Instruction, Information and Strategies They Need to Protect Child Victims and Prosecute...
  • Blog Post: The Security Show: Episode Two – Stopping James Bond (Part II)

    In this part, we get some good advice from the FBI on how to have that talk with your executives who like to travel out of the country and don’t really understand the risk that they assume when they carry that laptop, cell phone, or other electronic device with them. Good stuff!
  • Blog Post: ALERT: $250,000 Reward

    REDMOND, Wash. — Feb. 12, 2009 — Today, Microsoft Corp. announced a partnership with technology industry leaders and academia to implement a coordinated, global response to the Conficker (aka Downadup) worm. Together with security researchers, Internet Corporation for Assigned Names and Numbers (ICANN...
  • Blog Post: Meet The Feds: Part 2

    We start off this episode with Agent Lynd explaining to us the danger of botnets and who these bot pimps are targeting. We see that some of these bad guys are using these “zombie networks” to commit extortion (or face the wrath of my botnet doing a DDoS against your business.) Good stuff. Allyn goes...
  • Blog Post: The Security Show: Episode Two – Stopping James Bond (Part I)

    I got it to work! I had some issues with the video playback in Silverlight after it came out of post-production in Sony Vegas. I really wish there was an easy way for Expressions Encoder to sort of “save your profile” so you wouldn’t have to go and tweak settings each and every time. Pretty much a hassle...
  • Blog Post: The Security Show: Episode Two – Stopping James Bond (Part III)

    I hope this is waking some folks up with regards to the huge issue that insider threat poses within your own company. We discuss some of the common characteristics that these people show and how we identify them. What are some of the triggers that make these folks turn against you? What are the warning...
  • Blog Post: The Security Show: Episode Two – Stopping James Bond (Part IV)

    This is the last of Episode Two and I hope everyone has been enjoying this interesting session with the FBI. In this final session, we wrapup and get a few comments from the audience. Good stuff.   Next time, I’ll be posting Episode 3 titled “Gate, Guards, and Guns” where we’ll spend some time talking...
  • Blog Post: The FBI Celebrates it’s 100th Anniversary!

    I had the distinct honor this week, of attending the Bureau’s 100th Anniversary celebration event here at the Dallas FBI Field Office . (I’m the one that’s not blurry in the picture on the left) The event itself was very well done and the speeches by both Special Agent in Charge Casey and by Sen. Kay...
  • Blog Post: Big Bang Machine Hacked!

    Well, apparently no one planned any information security with the super collider. I love the quote from this guy who is obviously not a security guy “ We don’t know who they were but there seems to be no harm done. ” Right. No harm done. We’re sorta sure. Time to buy a tin-foil hat.
  • Blog Post: World of Warcraft players targeted for malware (and the new Blizzard MultiFactor Authentication Solution)

    There is a term that I hear quite often from my contacts in the law enforcement community, when it comes to cybercrime: “ Follow the money .” Well, apparently that term is also being used by the bad guys, and in this case it’s “ Follow the gold pieces .” All Your Epic Gear Is Belong to Us Okay….it’s...
  • Blog Post: Is Cloud Computing Really Risk Transference?

    The current buzz in the technology industry is all about this idea of Cloud Computing. It goes by many many names but we’ll just stick with this one to eliminate confusion. Sure, it’s a great idea and vendors are talking about “moving your data to the cloud” where someone else can manage your data, provide...
  • Blog Post: Meet The Feds: Part 3…..Understanding the Coming Threats

    This is the last 10 minutes of Day 1 at TechEd 2008 for Agent Lynd and I. In this wrapup, Agent Lynd covers some of the trends in the security landscape and some of the things that IT Pros need to be to be watching for going forward. Next time I’ll load up the video from the Day 2 episode, where we sat...
  • Blog Post: The Security Guy Blog Adds Video!!

    This is something that I’ve been attempting to do for quite awhile, but as you can imagine, traveling every week precludes a lot of testing. Now that I’ve got a few weeks to play with this stuff, do expense reports, and remember where my house is….I’m trying to get more and more creative. I think this...
  • Blog Post: RSA 2008 - Day Last: Underground Online Crime

    Well, I'm sorry for the delay in posting, but I didn't get home until after 10:30PM on Friday night, but American Airlines did get me home and given the issues with the MD-80s recently, I'm just happy to have made it. Even got bumped to First Class which is always nice. I had the chance to attend only...