Global Cyber Security Inisght
By Global Cyber Security Inisght
About this podcast
The effort began to bring together professionals in the Cyber Security arena from around the world; to elevate the field through knowledge transfer, professional communication, and professional development. As a Cyber Security Society, our efforts will provide a unique perspective on cyber threats and countering those threats through analysis and experienced gained through real world application. This expects to be unlike any other organization which exists in the field today. The content will deliver analysis of Advanced Persistent Threats (APT) and complimentary situational support to assist in securing the cyberspace ecosystem.

Episodes (Total: 5 / Page: 1)
Jan. 20, 2014 · 00:03:48
You might not know KAPTOXA (KAR-TOE-SHA) According to an article in Business Insider there is belief that the recent breaches that have occurred for Target, Neimen Marcus and a host of other retail service stores is based on the work of a teenager from Russia. Intel Crawler an intelligence aggregator and cyber security firm. Pulled data from multiple underground and networked security contacts to create
Jan. 12, 2014 · 00:14:22
As an instructor for Iowa Central Community College’s Criminal Justice Program, Joey Hernandez worked to develop future Law Enforcement personnel by integrating their background in standard law enforcement to  criminal activity on the web. Hernandez strived to make all lesson interactive. Follow along in the podcast and presentation to see how the inter-workings of Gang Graffiti & Web Defacement are directly integrated. View the presentation:
Jan. 12, 2014 · 00:17:27
Follow Along Briefing With Podcast  TYPOSQUATTING_Joey_Hernandez Similar To Domain Squatting –Targets BRAND NAME domains –Relies on typographical errors made by direct input URLs –Often involved with illegal activity –Also used for FINANCIAL gain • According to Brandjacking Index, the risk of brand misuse worldwide is the highest in US, Germany and UK. –59%+ all websites using brand names for illegal purposes originate from these three
Jan. 11, 2014 · 00:16:05
As we continue to develop capabilities within organizations providing Defensive Cyber Operations it is critical to develop organizational maturity. Current methodologies although effective are unsustainable do to the rapid evolvement of cyber threat. A organizational level approach can be made by adopting some of the following objectives: 1. Increase the pay scale for “qualified” CND Analysts – CIRT staff are often the lowest paid tier
Jan. 11, 2014 · 00:01:07
Joey Hernandez makes a quick cast concerning his background to get this Cyber Security Podcast series kicked off. The very first