Welcome!

Information Security and Network Awareness

Hurricane Labs

Subscribe to Hurricane Labs: eMailAlertsEmail Alerts
Get Hurricane Labs via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Hurricane Labs

By Bill Mathews This is not a Top 10 list – it is a list of 10 things I’ve learned along the way. Top 10 lists imply some sort of universal knowledge of the “top” things possible in a given field. Top 10 attractive women, top 10 guitar players, top 10 whatever, they all have one thing in common: They are all ten things the author thinks are the best. I don’t really like to think I know everything so this list is in no particular order. This particular list is on cloud security and, well, it is a big topic that interests me greatly and there is no way I can cover it all in a blog post. As a result I will be doing a presentation around this topic in a few places, including BSides Cleveland. Anyway, cloud security is tough for a lot of reasons, not least of which is because you, like me, probably only understand the basics of what you interface with in the cloud – th... (more)

Looking for a Little 'Big Data' Clarity? By @_RyanOConnor | @BigDataExpo #BigData

Time to Put Some Big Data Misconceptions to Rest by Ryan O'Connor As a recent graduate, and now professor in the University of Connecticut's Business Analytics and Project Management masters program, I have a lot of conversations surrounding the topic of "Big Data" and questions such as, "What does that term actually mean?" Big Data is a fairly new topic and what seems to be an elusive term for many. Conversations are important to help bring clarity to Big Data, as well as generate ideas about how we can shape, not only what it is, but also the future of where it's going. Not th... (more)

So You Wanna Be an Information Security Superstar?

Written by Rick Deacon Recently I’ve been faced with a very difficult type of question, and it isn’t even technical. No, it’s not the typical ‘How do you find a buffer overflow?’ or ‘Can you write me code entirely in assembly in 20 minutes?’ It’s much more difficult to answer. It’s answer, to many people, may be the ‘key’ they are looking for in this industry. The question is very often phrased as “So what did it take for you to get where you are?” or “How do I get into the security industry?” and even sometimes “How do I become a hacker?” There are many different approaches to... (more)

Beacon Podcast – Episode 022

Hurricane Labs Beacon Podcast Episode Number: .022 – Ice Cube Plants Edition Hosts: Bill Mathews (@billford), Matt Yonchak (@mattyonchak), Patrick Sayler (@psayler), Steve McMaster (@iamthemcmaster) Death of the SysAdmin - Who manages the cloud then? - Some comparisons are wrong Cloud Storage - iCloud not so great - Dropbox is awesome - Google Docs is good too NFC Payments - Is it safe? - Google Wallet talk Jeff Bezos Apollo 11 - Jeff Bezos is a pretty cool guy - MytBbusters moonlanding tests - Bill’s wife hates Plex Hack of the Week Chrome extensions App of the Week Angry Birds Space... (more)

Take Social Media Privacy Into Your Own Hands

By Steve McMaster - I’ve gotten in a lot of arguments lately about one of the latest “hot topics” in the end-user side of technology – privacy. With some of the biggest names in Social Media doing a really bad job of it (and I’m not even just talking about leaked passwords), it’s something that’s throwing itself in the face of many average, day-to-day computer users. Many in the security industry already know most of the things people are discovering, and have screamed warnings from the mountaintops to the folks below. Alas, this is the woe of being a security engineer. But here’... (more)