Jump to
Press alt + / to open this menu
CommunitySee All
Highlights info row image
153 people like this
Highlights info row image
153 people follow this
Highlights info row image
10 people have visited
People
153 likes
10 visits
Posts
Thanks to the ShadowBrokers, every two to four weeks, NSA exploits that are used to target Windows machines are publicized to its loyal subscribers.
cursivesecurity.com

Don't cast stones security folks. Let's get the facts first. More will surface in the weeks to come.

James Taliento

Is it #Equifax or Susan Mauldin's education that is supposed to be under fire? https://manipulatesecurity.com/…/equifax-and-the-precedent…/ #infosec #databreach

Equifax's security leadership, Susan Mauldin, who's qualification as Equifax's Chief Information Security Officer is being scrutinized, because of Susan's ed...
manipulatesecurity.com
Reviews
1 Review
Tell people what you think
Posts
So, what can you find on Pastebin? Oh, you know, just a bunch of source code, internet relay chat, code review, “Hundreds of ISIS Accounts!” and “HBO LEAKS GAME OF THRONES EPISODE 71” (spoiler alert). Pastebin – a media outlet for hackbait? The founder of Pastebin created the site with a vision to s...
cursivesecurity.com
So, what can you find on Pastebin? Oh, you know, just a bunch of source code, internet relay chat, code review, “Hundreds of ISIS Accounts!” and “HBO LEAKS GAME OF THRONES EPISODE 71” (spoiler alert). Pastebin – a media outlet for hackbait? The founder of Pastebin created the site with a vision to s...
cursivesecurity.com
Robot humans have the capabilities to cause a lot of damage, especially once that vengeful hacker figures out how to bypass security...
cursivesecurity.com
Cursive Security shared a post.
August 8

Choose your password wisely.

Bob McMillan
August 7

I interviewed the guy who came up with some of those annoying password rules that have plagued us for the past 15 years. He feels bad.

Bill Burr’s 2003 report recommended using numbers, obscure characters and capital letters and updating regularly. As his advice is overturned, he feels regretful.
wsj.com|By Robert McMillan

Many thanks to excellent host Neil Ball @ The Entrepreneur Way for the fabulous interview.

James Taliento is the founder and CEO of Cursive Security, Inc. – a provider of intelligence-driven cybersecurity services and solutions. Since his background is rooted in offensive security, James offers unique insight in his approach to evaluating enterprise networks and defensive strategy. He has...
theentrepreneurway.com|By Neil Ball

Cursive Security commenting on recent Long Island cyberattack. Notably, radio host calls James Taliento, Founder + CEO, "one of the leading experts in the country."

JVC Broadcasting is one of the largest independently owned and locally operated radio broadcast and entertainment companies. Run by local broadcasters, JVC’s commitment is to bring fun, exciting, loc
soundcloud.com
The concept of using remote web servers to host and manage data and applications, in other words, Cloud computing, is a paradigm shift in how we use computing at work (and home). Cloud computing has had a rocky road to acceptance, but it is now embraced by just about everyone with 95% of respondents...
cursivesecurity.com

Cursive Security Founder and CEO, James Taliento had commentary featured in TechTarget regarding the WannaCry ransomware outbreak http://searchitchannel.techtarget.com/…/Channel-partners-pr…

Ransomware cases could spike in coming weeks as attacks following the recent WannaCry outbreak could prove even worse, security service providers noted.
searchitchannel.techtarget.com
On May 12, 2017, ransomware suddenly took center stage in the cyber security theater of war
cursivesecurity.com
Red teaming is about challenging pre-defined and possibly entrenched ideas. It is about facilitating informed decisions that improve the process...
cursivesecurity.com
Threat intelligence feeds are data gathered from attacks around the world and either sold or given away for free. The idea is to take logs from your firewalls and the match those with the list of blacklisted IP addresses, domains, the email address of who registered a domain, etc. to determine what…
cursivesecurity.com
The anonymous leaker or leakers, Shadowbrokers, has dumped 300 MB of NSA source code and documentation onto the internet and published it at github. This is a large haul of zero-day exploits placed there with no advance warning. So affected vendors are not going to be able to patch right their softw...
cursivesecurity.com

Will the Internet of Things ring the death knell for #privacy? http://j.mp/2oikveT #iot #security #infosec

The IoT is opening up multiple cans of worms that we never expected. IoT privacy issues can hit in the most unexpected manner,
cursivesecurity.com
ELK also creates stunning visualizations and dashboards that you could use in any SOC (security operations center) or query data for hunting...
cursivesecurity.com