2023-10-29 | Guy Bruneau | Spam or Phishing? Looking for Credentials & Passwords |
2021-05-29 | Guy Bruneau | Spear-phishing Email Targeting Outlook Mail Clients |
2019-03-06 | Johannes Ullrich | March Edition of Ouch! Newsletter: Securely Disposing Mobile Devices https://www.sans.org/security-awareness-training/resources/disposing-your-mobile-device |
2017-09-18 | Johannes Ullrich | SANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up |
2017-08-13 | Didier Stevens | The Good Phishing Email |
2017-02-15 | Xavier Mertens | How was your stay at the Hotel La Playa? |
2017-01-11 | Johannes Ullrich | January 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch |
2016-04-02 | Russell Eubanks | Why Can't We Be Friends? |
2015-10-27 | Xavier Mertens | The "Yes, but..." syndrome |
2015-10-18 | Russell Eubanks | Security Awareness for Security Professionals |
2015-10-17 | Russell Eubanks | CIS Critical Security Controls - Version 6.0 |
2015-09-23 | Daniel Wesemann | Making our users unlearn what we taught them |
2015-05-07 | Chris Mohan | Security Awareness? How do you keep your staff safe? |
2014-07-02 | Johannes Ullrich | July Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014 |
2014-02-05 | Johannes Ullrich | SANS Ouch Security Awareness Newsletter What is Malware http://www.securingthehuman.org/ouch |
2013-10-01 | Adrien de Beaupre | CSAM! Send us your logs! |
2013-08-07 | Johannes Ullrich | New edition of the Ouch! Security Awareness Newsletter is out: http://www.securingthehuman.org/resources/newsletters/ouch/2013 |
2012-12-18 | Rob VandenBrink | All I Want for Christmas is to Not Get Hacked ! |
2012-10-30 | Mark Hofman | Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls |
2012-10-29 | Kevin Shortt | Cyber Security Awareness Month - Day 29 - Clear Desk: The Unacquainted Standard |
2012-10-26 | Russ McRee | Cyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant |
2012-10-25 | Richard Porter | Cyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire |
2012-10-24 | Russ McRee | Cyber Security Awareness Month - Day 24 - A Standard for Information Security Incident Management - ISO 27035 |
2012-10-23 | Rob VandenBrink | Cyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors |
2012-10-21 | Johannes Ullrich | Cyber Security Awareness Month - Day 22: Connectors |
2012-10-19 | Johannes Ullrich | Cyber Security Awareness Month - Day 19: Standard log formats and CEE. |
2012-10-18 | Rob VandenBrink | Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide |
2012-10-17 | Rob VandenBrink | Cyber Security Awareness Month - Day 17 - A Standard for Risk Management - ISO 27005 |
2012-10-16 | Richard Porter | CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook. |
2012-10-16 | Johannes Ullrich | Cyber Security Awareness Month - Day 16: W3C and HTML |
2012-10-14 | Pedro Bueno | Cyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1 |
2012-10-13 | Guy Bruneau | New Poll - Cyber Security Awareness Month Activities 2012 - https://isc.sans.edu/poll.html |
2012-10-12 | Mark Hofman | Cyber Security Awareness Month - Day 12 PCI DSS |
2012-10-11 | Rob VandenBrink | Cyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security) |
2012-10-10 | Kevin Shortt | Cyber Security Awareness Month - Day 10 - Standard Sudo - Part Two |
2012-10-09 | Johannes Ullrich | Cyber Security Awreness Month - Day 9 - Request for Comment (RFC) |
2012-10-08 | Mark Hofman | Cyber Security Awareness Month - Day 8 ISO 27001 |
2012-10-07 | Tony Carothers | Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1 |
2012-10-06 | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 6 - NERC: The standard that enforces security on power SCADA |
2012-10-05 | Johannes Ullrich | Cyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl. |
2012-10-04 | Johannes Ullrich | Cyber Security Awareness Month - Day 4: Crypto Standards |
2012-10-03 | Kevin Shortt | Cyber Security Awareness Month - Day 3 - Standard Sudo - Part One |
2012-10-02 | Russ McRee | Cyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines |
2012-10-01 | Johannes Ullrich | Cyber Security Awareness Month |
2012-07-14 | Tony Carothers | User Awareness and Education |
2011-10-29 | Richard Porter | The Sub Critical Control? Evidence Collection |
2011-10-28 | Russ McRee | Critical Control 19: Data Recovery Capability |
2011-10-28 | Daniel Wesemann | Critical Control 20: Security Skills Assessment and Training to fill Gaps |
2011-10-27 | Mark Baggett | Critical Control 18: Incident Response Capabilities |
2011-10-26 | Rick Wanner | Critical Control 17:Penetration Tests and Red Team Exercises |
2011-10-17 | Rob VandenBrink | Critical Control 11: Account Monitoring and Control |
2011-10-13 | Guy Bruneau | Critical Control 10: Continuous Vulnerability Assessment and Remediation |
2011-10-12 | Kevin Shortt | Critical Control 8 - Controlled Use of Administrative Privileges |
2011-10-11 | Swa Frantzen | Critical Control 7 - Application Software Security |
2011-10-10 | Jim Clausing | Critical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs |
2011-10-07 | Mark Hofman | Critical Control 5 - Boundary Defence |
2011-10-04 | Rob VandenBrink | Critical Control 2 - Inventory of Authorized and Unauthorized Software |
2011-10-04 | Johannes Ullrich | Critical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers |
2011-10-03 | Mark Hofman | Critical Control 1 - Inventory of Authorized and Unauthorized Devices |
2011-10-03 | Mark Baggett | What are the 20 Critical Controls? |
2011-10-03 | Tom Liston | Security 101 : Security Basics in 140 Characters Or Less |
2011-10-02 | Mark Hofman | Cyber Security Awareness Month Day 1/2 - Schedule |
2011-10-02 | Mark Hofman | Cyber Security Awareness Month Day 1/2 - Introduction to the controls |
2011-09-21 | Mark Hofman | October 2011 Cyber Security Awareness Month |
2011-09-15 | Johannes Ullrich | September OUCH! awareness newsletter released - How to use social networking sites safely. http://bit.ly/ja6TMH |
2011-08-17 | Johannes Ullrich | August edition of security awareness newsletter OUCH! released. Focus: Updating your Software http://t.co/ftRVetZ |
2011-06-15 | Johannes Ullrich | Latest issue of "Ouch!" is out http://www.securingthehuman.org/resources/newsletters/ouch |
2011-05-31 | Chris Mohan | Getting the IT security word out there to the rest of the world |
2011-05-21 | Daniel Wesemann | Weekend reading |
2011-04-13 | Johannes Ullrich | April issue of SANS Security Awareness Newsletter is out http://www.securingthehuman.org/resources/ouch |
2010-10-31 | Marcus Sachs | Cyber Security Awareness Month - Day 31 - Tying it all together |
2010-10-30 | Guy Bruneau | Cyber Security Awareness Month - Day 30 - Role of the network team |
2010-10-29 | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 29- Role of the office geek |
2010-10-28 | Rick Wanner | Cyber Security Awareness Month - Day 27 - Social Media use in the office |
2010-10-28 | Tony Carothers | Cyber Security Awareness Month - Day 28 - Role of the employee |
2010-10-26 | Pedro Bueno | Cyber Security Awareness Month - Day 26 - Sharing Office Files |
2010-10-25 | Kevin Shortt | Cyber Security Awareness Month - Day 25 - Using Home Computers for Work |
2010-10-24 | Swa Frantzen | Cyber Security Awarenes Month - Day 24 - Using work computers at home |
2010-10-23 | Mark Hofman | Cyber Security Awareness Month - Day 23 - The Importance of compliance |
2010-10-22 | Daniel Wesemann | Cyber Security Awareness Month - Day 22 - Security of removable media |
2010-10-21 | Chris Carboni | Cyber Security Awareness Month - Day 21 - Impossible Requests from the Boss |
2010-10-20 | Jim Clausing | Cyber Security Awareness Month - Day 20 - Securing Mobile Devices |
2010-10-19 | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote Access Tools |
2010-10-19 | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split? |
2010-10-19 | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - VPN Architectures – SSL or IPSec? |
2010-10-19 | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard? |
2010-10-19 | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - VPN and Remote Access Tools |
2010-10-18 | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis |
2010-10-17 | Stephen Hall | Cyber Security Awareness Month - Day 17 - What a boss should and should not have access to |
2010-10-15 | Marcus Sachs | Cyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students |
2010-10-15 | Guy Bruneau | Cyber Security Awareness Month - Day 16 - Securing a donated computer |
2010-10-14 | Johannes Ullrich | Cyber Security Awareness Month - Day 14 - Securing a public computer |
2010-10-13 | Deborah Hale | Cyber Security Awareness Month - Day 13 - Online Bullying |
2010-10-12 | Scott Fendley | Cyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites |
2010-10-11 | Rick Wanner | Cyber Security Awareness Month - Day 11 - Safe Browsing for Teens |
2010-10-10 | Kevin Liston | Cyber Security Awareness Month - Day 10 - Safe browsing for pre-teens |
2010-10-09 | Kevin Shortt | Cyber Security Awareness Month - Day 9 - Disposal of an Old Computer |
2010-10-08 | Rick Wanner | Cyber Security Awareness Month - Day 8 - Patch Management and System Updates |
2010-10-06 | Rob VandenBrink | Cyber Security Awareness Month - Day 7 - Remote Access and Monitoring Tools |
2010-10-06 | Marcus Sachs | Cyber Security Awareness Month - Day 6 - Computer Monitoring Tools |
2010-10-05 | Rick Wanner | Cyber Security Awareness Month - Day 5 - Sites you should stay away from |
2010-10-04 | Daniel Wesemann | Cyber Security Awareness Month - Day 4 - Managing EMail |
2010-10-03 | Adrien de Beaupre | Cyber Security Awareness Month - Day 3 - Recognizing phishing and online scams |
2010-10-02 | Mark Hofman | Cyber Security Awareness Month - Day 2 - Securing the Family Network |
2010-10-01 | Marcus Sachs | Cyber Security Awareness Month - 2010 |
2010-10-01 | Marcus Sachs | Cyber Security Awareness Month - Day 1 - Securing the Family PC |
2010-08-08 | Marcus Sachs | Thinking about Cyber Security Awareness Month in October |
2010-05-07 | Rob VandenBrink | Security Awareness – Many Audiences, Many Messages (Part 2) |
2010-05-02 | Mari Nichols | Zbot Social Engineering |
2010-04-07 | Rob VandenBrink | The Many Paths to Security Awareness |
2010-03-07 | Mari Nichols | DHS issues Cybersecurity challenge |
2010-02-20 | Mari Nichols | Is "Green IT" Defeating Security? |
2009-10-29 | Kyle Haugsness | Cyber Security Awareness Month - Day 29 - dns port 53 |
2009-10-28 | Johannes Ullrich | Cyber Security Awareness Month - Day 28 - ntp (123/udp) |
2009-10-25 | Lorna Hutcheson | Cyber Security Awareness Month - Day 25 - Port 80 and 443 |
2009-10-22 | Adrien de Beaupre | Cyber Security Awareness Month - Day 22 port 502 TCP - Modbus |
2009-10-21 | Pedro Bueno | Cyber Security Awareness Month - Day 21 - Port 135 |
2009-10-19 | Daniel Wesemann | Cyber Security Awareness Month - Day 19 - ICMP |
2009-10-18 | Mari Nichols | Computer Security Awareness Month - Day 18 - Telnet an oldie but a goodie |
2009-10-16 | Adrien de Beaupre | Cyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener |
2009-10-11 | Mark Hofman | Cyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP) |
2009-10-09 | Rob VandenBrink | Cyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP) |
2009-10-06 | Adrien de Beaupre | Cyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp |
2009-10-05 | Adrien de Beaupre | Cyber Security Awareness Month - Day 5 port 31337 |
2009-10-02 | Stephen Hall | Cyber Security Awareness Month - Day 2 - Port 0 |
2009-09-20 | Mari Nichols | Insider Threat and Security Awareness |
2009-06-20 | Scott Fendley | Situational Awareness: Spam Crisis and China |
2008-11-04 | Marcus Sachs | Cyber Security Awareness Month 2008 - Summary and Links |
2008-11-03 | Joel Esler | Day 34 -- Feeding The Lessons Learned Back to the Preparation Phase |
2008-11-02 | Mari Nichols | Day 33 - Working with Management to Improve Processes |
2008-11-01 | Koon Yaw Tan | Day 32 - What Should I Make Public? |
2008-10-31 | Rick Wanner | Day 31 - Legal Awareness |
2008-10-30 | Kevin Liston | Day 30 - Applying Patches and Updates |
2008-10-29 | Deborah Hale | Day 29 - Should I Switch Software Vendors? |
2008-10-28 | Jason Lam | Day 28 - Avoiding Finger Pointing and the Blame Game |
2008-10-27 | Johannes Ullrich | Day 27 - Validation via Vulnerability Scanning |
2008-10-25 | Koon Yaw Tan | Day 25 - Finding and Removing Hidden Files and Directories |
2008-10-25 | Rick Wanner | Day 26 - Restoring Systems from Backup |
2008-10-24 | Stephen Hall | Day 24 - Cleaning Email Servers and Clients |
2008-10-22 | Johannes Ullrich | Day 22 - Wiping Disks and Media |
2008-10-22 | Chris Carboni | Day 23 - Turning off Unused Services |
2008-10-21 | Johannes Ullrich | Day 21 - Removing Bots, Keyloggers, and Spyware |
2008-10-20 | Raul Siles | Day 20 - Eradicating a Rootkit |
2008-10-19 | Lorna Hutcheson | Day 19 - Eradication: Forensic Analysis Tools - What Happened? |
2008-10-17 | Patrick Nolan | Day 17 - Containing a DNS Hijacking |
2008-10-17 | Rick Wanner | Day 18 - Containing Other Incidents |
2008-10-16 | Mark Hofman | Day 16 - Containing a Malware Outbreak |
2008-10-15 | Rick Wanner | Day 15 - Containing the Damage From a Lost or Stolen Laptop |
2008-10-14 | Swa Frantzen | Day 14 - Containment: a Personal IdentityTheft Incident |
2008-10-13 | Adrien de Beaupre | Day 13 - Containment: Containing on Production Systems Such as a Web Server |
2008-10-12 | Mari Nichols | Day 12 Containment: Gathering Evidence That Can be Used in Court |
2008-10-11 | Stephen Hall | Day 11 - Identification: Other Methods of Identifying an Incident |
2008-10-10 | Marcus Sachs | Day 10 - Identification: Using Your Help Desk to Identify Security Incidents |
2008-10-09 | Marcus Sachs | Day 9 - Identification: Log and Audit Analysis |
2008-10-08 | Johannes Ullrich | Day 8 - Global Incident Awareness |
2008-10-07 | Kyle Haugsness | Day 7 - Identification: Host-based Intrusion Detection Systems |
2008-10-06 | Jim Clausing | Day 6 - Network-based Intrusion Detection Systems |
2008-10-05 | Stephen Hall | Day 5 - Identification: Events versus Incidents |
2008-10-04 | Marcus Sachs | Day 4 - Preparation: What Goes Into a Response Kit |
2008-10-03 | Jason Lam | Day 3 - Preparation: Building Checklists |
2008-10-02 | Marcus Sachs | Day 2 - Preparation: Building a Response Team |
2008-10-01 | Marcus Sachs | Day 1 - Preparation: Policies, Management Support, and User Awareness |
2008-09-30 | Marcus Sachs | Cyber Security Awareness Month - Daily Topics |
2008-09-21 | Mari Nichols | You still have time! |