Stephen and Chey Cobb: Independent Researchers

Public-interest technology, information security, data privacy, risk and gender issues in tech

Pages

  • Home
  • Cybersecurity Awareness
  • Cybersecurity Resources
  • Quotes on Cybersecurity, Cybercrime, Hacking, and Data Privacy
  • Contact

Tuesday, December 04, 2012

More Cobb security resources

Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
This is just a quick post to update links to Cobb-sourced information security resources. Here's a round of articles by Mike Cobb, CISSP:

Best Practices: 6 Security Services Every Small Business Must Have
Best Practices: 5 Security Tools Every Small Business Must Have
Strategy: Evaluating and Choosing Threat Intelligence Tools
Strategy: Measuring Risk: A Security Pro's Guide
Strategy: Finding the Right Security Outsourcing Balance
Strategy: Tracking the Source of APTs
Strategy: Detecting and Defending Against Advanced Persistent Threats
Strategy: Stop Illicit Data Dumps
Biometrics for the Rest of Us
Strategy: Biometrics

And here is a handy link for the articles Stephen Cobb posts on the ESET blog:

Stephen Cobb on the ESET blog 
Posted by Stephen Cobb No comments:
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Connect through Stephen's Link Tree

Search This Blog

Stephen Cobb

Stephen Cobb

Featured Post

Big jump in losses due to Internet crimes in 2021, up 64% according to latest IC3/FBI report

IC3/FBI internet crime data graphed by S. Cobb In 2021, the world came to rely on digital technologies even more than it had in 2020. Sadly,...

Previous Articles

  • ►  2022 (2)
    • ►  December (1)
    • ►  March (1)
  • ►  2021 (5)
    • ►  April (1)
    • ►  March (2)
    • ►  January (2)
  • ►  2020 (45)
    • ►  December (1)
    • ►  November (1)
    • ►  October (31)
    • ►  September (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2019 (9)
    • ►  November (1)
    • ►  August (3)
    • ►  July (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2018 (3)
    • ►  August (1)
    • ►  May (1)
    • ►  February (1)
  • ►  2017 (7)
    • ►  December (1)
    • ►  September (1)
    • ►  July (1)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2016 (11)
    • ►  October (2)
    • ►  September (2)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  March (1)
    • ►  February (1)
  • ►  2015 (4)
    • ►  September (1)
    • ►  August (1)
    • ►  May (1)
    • ►  January (1)
  • ►  2014 (12)
    • ►  December (2)
    • ►  August (2)
    • ►  May (1)
    • ►  April (2)
    • ►  January (5)
  • ►  2013 (6)
    • ►  December (2)
    • ►  October (1)
    • ►  September (1)
    • ►  March (2)
  • ▼  2012 (8)
    • ▼  December (1)
      • More Cobb security resources
    • ►  October (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2011 (9)
    • ►  August (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  January (2)
  • ►  2010 (8)
    • ►  December (1)
    • ►  October (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (3)
    • ►  January (1)
  • ►  2009 (8)
    • ►  December (1)
    • ►  November (1)
    • ►  August (1)
    • ►  July (2)
    • ►  April (2)
    • ►  March (1)
  • ►  2008 (9)
    • ►  December (2)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (4)
  • ►  2007 (35)
    • ►  August (1)
    • ►  June (1)
    • ►  May (6)
    • ►  April (5)
    • ►  March (6)
    • ►  February (11)
    • ►  January (5)
  • ►  2006 (19)
    • ►  December (8)
    • ►  November (4)
    • ►  September (2)
    • ►  August (1)
    • ►  July (2)
    • ►  March (1)
    • ►  January (1)
  • ►  2005 (12)
    • ►  October (3)
    • ►  August (1)
    • ►  July (4)
    • ►  June (4)

CHEY COBB

CHEY COBB

More of what we think

  • Twitter
  • Medium
  • YouTube
  • LinkedIn.
  • Link Tree

Certified Since 1996 :-)

Certified Since 1996 :-)

Contact Chey or Stephen Cobb

Name

Email *

Message *

Free download: PC/LAN security book (from the 1990s)

Free download: PC/LAN security book (from the 1990s)


Free Privacy eBook

Download my 2002 book on data privacy. Much of what I wrote back then about privacy principles is still relevant.
My photo
Stephen Cobb
Award-winning technologist and bestselling author, trying to understand and undo the mess that patriarchy has made of technology and our planet. Hampered by amusia and deuteranopia. Helped by an amazing partner and family. Have spent more than three decades researching, writing, and teaching at the nexus of technology, ethics, crime, and public policy. Spoke at DEF CON III in 95. CISSP since 1996. Pushing for more ethics in technology education and global agreements to increase stability in cyberspace. Started two successful infosec companies. Produced an award-winning documentary about civil rights (file under: made no money, but made a difference). Raising awareness of hereditary hemochromatosis (the widely under-diagnosed genetic defect that disabled my partner). MSc in Security and Risk Management from the Criminology Department of the University of Leicester, England. Failures? Nearly lost it all in the Great Recession. Can't sing or play a musical instrument (due to congenital amusia, not a defect in my character).
View my complete profile

Visit We Live Security

Visit We Live Security
If you found this article interesting and/or helpful please consider buying me a coffee to fuel more writing like this.
Copyright Stephen & Chey Cobb, 2020. Powered by Blogger.