Welcome!

Information Security and Network Awareness

Hurricane Labs

Subscribe to Hurricane Labs: eMailAlertsEmail Alerts
Get Hurricane Labs via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Hurricane Labs

By: Ian Gillespie Warning: I am not an Information Security expert – I am the Lead Designer at Hurricane Labs. I do not know the detailed best practices of securing a network or how to set up a SIEM such as Splunk. You may be asking yourself, “Why the heck is this guy even writing an article on a blog about Information Security?!” Hold on a second – what I propose is an outsider’s perspective on the idea of information security as a whole. My perspective may not be the same as that of an information security specialist, but that’s the point. The purpose of this article is to hopefully be entertaining, but to also allow me to rant, or vent my frustrations with things having to do with security – whether it be company practices, or even just the way we share our information on social networks. I hope to write a few blog posts in the coming weeks. Hopefully you will g... (more)

Ten Things I’ve Learned About Cloud Security

By Bill Mathews This is not a Top 10 list – it is a list of 10 things I’ve learned along the way. Top 10 lists imply some sort of universal knowledge of the “top” things possible in a given field. Top 10 attractive women, top 10 guitar players, top 10 whatever, they all have one thing in common: They are all ten things the author thinks are the best. I don’t really like to think I know everything so this list is in no particular order. This particular list is on cloud security and, well, it is a big topic that interests me greatly and there is no way I can cover it all in a blog... (more)

Encrypt My Information, Please

By: Leigh Goldie For the last few months, security breaches have been on the rise (or let’s just say have been receiving more news coverage). We have seen countless stories of large, popular websites being compromised by unknown, or later identified, hackers. The quest, it seems, is to determine how easy it is to access the personal information of customers from any popular company. The hackers are proud of their accomplishments, as they have gained access to tens of millions of users account information. But it seems they have a message for corporations – encrypt your customers... (more)

Beacon Podcast – Episode 038

Hurricane Labs Beacon Podcast Episode Number: .038 – Tom Has Friends Edition Hosts: Bill Mathews (@billford), Ian Gillespie (@ianisgood), Patrick Sayler (@psayler), Tom Kopchak SECURITY RSA Distributed Credential Protection Pacemaker hacker says worm could possibly ‘commit mass murder’ Android Play Store adding malware scanner US congress rules Huawei a ‘security threat’ TECH Congressman warns FTC: Leave Google alone Verizon, AT&T sell users’ browsing, location histories to marketers How to Make Your Boss Angry — Bad Linux Sysadmin Practices Splunk – Tips and Tricks for the new guy Readin... (more)

Ten Things I’ve Learned About Cloud Security

This is not a Top 10 list – it is a list of 10 things I’ve learned along the way. Top 10 lists imply some sort of universal knowledge of the “top” things possible in a given field. Top 10 attractive women, top 10 guitar players, top 10 whatever, they all have one thing in common: They are all ten things the author thinks are the best. I don’t really like to think I know everything so this list is in no particular order. This particular list is on cloud security and, well, it is a big topic that interests me greatly and there is no way I can cover it all in a blog post. As a resul... (more)