Stephen and Chey Cobb: Independent Researchers

Public-interest technology, information security, data privacy, risk and gender issues in tech

Pages

  • Home
  • Cybercrime & Health
  • Cybersecurity Awareness
  • Cybersecurity Resources
  • Quotes on Cyber-everything
  • Contact

Tuesday, December 04, 2012

More Cobb security resources

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
This is just a quick post to update links to Cobb-sourced information security resources. Here's a round of articles by Mike Cobb, CISSP:

Best Practices: 6 Security Services Every Small Business Must Have
Best Practices: 5 Security Tools Every Small Business Must Have
Strategy: Evaluating and Choosing Threat Intelligence Tools
Strategy: Measuring Risk: A Security Pro's Guide
Strategy: Finding the Right Security Outsourcing Balance
Strategy: Tracking the Source of APTs
Strategy: Detecting and Defending Against Advanced Persistent Threats
Strategy: Stop Illicit Data Dumps
Biometrics for the Rest of Us
Strategy: Biometrics

And here is a handy link for the articles Stephen Cobb posts on the ESET blog:

Stephen Cobb on the ESET blog 
Posted by Stephen Cobb

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)
Connect through Stephen's Link Tree

Search This Blog

Stephen Cobb

Stephen Cobb

More of what we think

  • Medium
  • Blue Sky
  • YouTube
  • LinkedIn
  • Link Tree
  • Twitter

Featured Post

Artificial Intelligence is really just another vulnerable, hackable, information system

Recent hype around Artificial Intelligence (AI) and the amazingly good and bad things that it can and may do has prompted me to remind the w...

Previous Articles

  • ►  2025 (2)
    • ►  April (1)
    • ►  March (1)
  • ►  2024 (3)
    • ►  October (1)
    • ►  July (1)
    • ►  April (1)
  • ►  2023 (4)
    • ►  November (2)
    • ►  April (1)
    • ►  March (1)
  • ►  2022 (3)
    • ►  December (1)
    • ►  July (1)
    • ►  March (1)
  • ►  2021 (5)
    • ►  April (1)
    • ►  March (2)
    • ►  January (2)
  • ►  2020 (45)
    • ►  December (1)
    • ►  November (1)
    • ►  October (31)
    • ►  September (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2019 (9)
    • ►  November (1)
    • ►  August (3)
    • ►  July (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2018 (3)
    • ►  August (1)
    • ►  May (1)
    • ►  February (1)
  • ►  2017 (7)
    • ►  December (1)
    • ►  September (1)
    • ►  July (1)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2016 (11)
    • ►  October (2)
    • ►  September (2)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  March (1)
    • ►  February (1)
  • ►  2015 (4)
    • ►  September (1)
    • ►  August (1)
    • ►  May (1)
    • ►  January (1)
  • ►  2014 (12)
    • ►  December (2)
    • ►  August (2)
    • ►  May (1)
    • ►  April (2)
    • ►  January (5)
  • ►  2013 (6)
    • ►  December (2)
    • ►  October (1)
    • ►  September (1)
    • ►  March (2)
  • ▼  2012 (8)
    • ▼  December (1)
      • More Cobb security resources
    • ►  October (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2011 (9)
    • ►  August (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  January (2)
  • ►  2010 (8)
    • ►  December (1)
    • ►  October (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (3)
    • ►  January (1)
  • ►  2009 (8)
    • ►  December (1)
    • ►  November (1)
    • ►  August (1)
    • ►  July (2)
    • ►  April (2)
    • ►  March (1)
  • ►  2008 (9)
    • ►  December (2)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (4)
  • ►  2007 (35)
    • ►  August (1)
    • ►  June (1)
    • ►  May (6)
    • ►  April (5)
    • ►  March (6)
    • ►  February (11)
    • ►  January (5)
  • ►  2006 (19)
    • ►  December (8)
    • ►  November (4)
    • ►  September (2)
    • ►  August (1)
    • ►  July (2)
    • ►  March (1)
    • ►  January (1)
  • ►  2005 (12)
    • ►  October (3)
    • ►  August (1)
    • ►  July (4)
    • ►  June (4)

Visit We Live Security

Visit We Live Security

CHEY COBB

CHEY COBB

Certified Since 1996 :-)

Certified Since 1996 :-)

Contact Chey or Stephen Cobb

Name

Email *

Message *

Free download: PC/LAN security book (from the 1990s)

Free download: PC/LAN security book (from the 1990s)

Free Privacy eBook

Download my 2002 book on data privacy. Much of what I wrote back then about privacy principles is still relevant.
My photo
Stephen Cobb
Award-winning technologist and bestselling author, trying to understand and undo the mess that patriarchy has made of technology and our planet. Hampered by amusia and deuteranopia. Helped by an amazing partner and family. Have spent more than three decades researching, writing, and teaching at the nexus of technology, ethics, crime, and public policy. Spoke at DEF CON III in 95. CISSP since 1996. Pushing for more ethics in technology education and global agreements to increase stability in cyberspace. Started two successful infosec companies. Produced an award-winning documentary about civil rights (file under: made no money, but made a difference). Raising awareness of hereditary hemochromatosis (the widely under-diagnosed genetic defect that disabled my partner). MSc in Security and Risk Management from the Criminology Department of the University of Leicester, England. Failures? Nearly lost it all in the Great Recession. Can't sing or play a musical instrument (due to congenital amusia, not a defect in my character).
View my complete profile
If you found this article interesting and/or helpful please consider buying me a coffee to fuel more writing like this.
Copyright Stephen & Chey Cobb, 2025. Powered by Blogger.