Kevin
-
Recent Posts
-

-

Archives
- January 2025
- December 2024
- October 2023
- September 2023
- July 2023
- June 2023
- May 2023
- April 2023
- February 2023
- January 2023
- July 2022
- May 2022
- April 2018
- February 2018
- June 2017
- September 2016
- March 2016
- February 2016
- December 2015
- April 2015
- February 2015
- November 2014
- October 2014
- September 2014
- March 2014
- December 2013
- October 2013
- March 2013
- November 2012
- October 2012
-
Author Archives: mclaukl
A day in the life of a senior Cyber Security Incident Responder
The day was proving to be an exciting one for team Havoc, the Company’s cyber Red Team, as the L2 report he had just read showed that 4 of the core company servers were vulnerable to a very common … Continue reading
What’s It Going to Take to Have Cyber Security?
Written by- Kevin L. and Kody T. McLaughlin If you are a Cyber Security professional do you get as mad as I do when you read and hear over and over again that Cyber Security professionals don’t have enough talent, … Continue reading
Posted in Uncategorized
Leave a comment
The Cyber Security CIA explained via Calvin and Hobbes
Leave it to my son Kody, who is starting his Cyber Security career to come up with this novel way to explain the CIA triad for Cyber Security. In InfoSec terms, CIA refers to Confidentiality, Integrity, and Availability. To illustrate … Continue reading
Compliance does not Equal Security
When I read items like this: Agarwal said NoMoreRack is now in the process of certifying itself this time as a Tier-1 merchant, even though the number of credit and debit cards it processed in 2013 placed it squarely in … Continue reading
Excelsior National Cyber Security Institute
In December 2013 I was named a fellow for the Excelsior National Cyber Security Institute. http://www.nationalcybersecurityinstitute.org/fellows/
Posted in Uncategorized
Tagged cyber security, Cyber Wargames, information assurance, information security, Security
Leave a comment
Short ISO Presentation
Posted in Uncategorized
Tagged cyber security, information assurance, information security, ISO
Leave a comment
Fun Story about UC Cyber Warfare Game
Ok, so I wasn’t going to share this but I sort of think its pretty neat. My friend Quinn and I started an urban legend story at the University of Cincinnati from my classes first cyber warfare event years ago. … Continue reading
Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence
Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence By: Kevin L. McLaughlin March 9, 2013 The amount of data available through electronic means is hard to wrap your mind around … Continue reading
Why Is It?
Why is it that Internet Crime statistics continue to show that for the criminally inclined internet crime is a very viable and fast growing field? Why is it that millions of dollars are stolen from end users who simply fail to … Continue reading
The Talent Within
11/8/2012 In his book “Topgrading: How leading companies win by hiring, coaching and keeping the best people” (2005) Dr. Smart talks about how important it is for a company to not only hire A level talent but then keep and … Continue reading