Tuesday, November 28, 2017

Tech Tip Tuesday - CTF Field Guide

If signed up, or are thinking about signing up, for the CampFIRE Cyber Security Challenge check out the Trail of Bits CTF Field Guide. In addition to finding other CTFs, it walks through the different types of challenges and provides training to ultimately help you win. How are you preparing for the CampFIRE?

https://trailofbits.github.io/ctf/

If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.

Tuesday, November 21, 2017

Tech Tip Tuesday - CampFIRE Cyber Security Challenge

CyberHawaii, University of Hawai‘i, and State of Hawai‘i is hosting a jeopardy-style, Capture the Flag (CTF) event. This half-day, on-site event is free for security professionals and college students. Participants can play in a team of two or individually. CampFIRE CTF is primarily focused around incident response and contains challenges that are based on real-life attacks or inspired by day-to-day security tasks. Upon completion of the event, participants will have learned about tools and techniques to deal with actual cyber security threats.

http://www.hawaii.edu/infosec/campfire/

If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.

Tuesday, November 14, 2017

Tech Tip Tuesday - Targeted Attack: The Game

Trend Micro has a “choose your own adventure” game that puts you in the Chief Information Officer’s (CIO’s) seat of a fictional company launching a new app. You are presented with multiple challenges and are responsible for the success or failure of the new endeavor. Not everyone aspires to be a CIO but understanding what problems look like at the C-level can help you communicate your challenges to leadership.

http://targetedattacks.trendmicro.com/

If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.

Tuesday, November 7, 2017

Tech Tip Tuesday - How to Protect Your Identity, Personal Data and Property

Our friends at Pacific Center for Advanced Technical Training (PCATT) shared this resource from Tom’s Guide a couple of days ago. The “What to Do If…” section covers some common issues like ransomware and identity theft. It also lists some tips for protecting yourself. It’s the perfect link to send someone asks, “Hey! You do computer stuff. What do you recommend?”

https://www.tomsguide.com/us/protect-yourself,review-4379.html

If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.

Thursday, November 2, 2017

Tech Tip Thursday - Risk

Over the past few days I saw many vendors at #AFCEATechNet Asia-Pacific and I realized that every product and service they offer is built to address one thing. Risk. The generally accepted risk equation is “Risk = Threat x Vulnerability x Impact” and different products take on different factors. A vendor that provides “real time threat intelligence” is focused on threats. The “vulnerability assessment” tools focus on the vulns. Other focus on maintaining “uptime” with “resilient networks” to reduce impact. This SANS article identifies Risk as one of the “Five Tenets of Cyber Security” but for me it all comes down to risk.

https://securingthehuman.sans.org/blog/2017/10/05/the-five-tenets-of-cyber-security/

If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.