Win A Free Pass to the USENIX Security Symposium 2017 Conference

By Blacks In Tech 0 Comments

Blacks In Technology will be giving away several free conference passes to the USENIX Security Symposium to select BIT community members. Continue reading

BIT Giving Away Complimentary Tickets to USENIX Security Symposium

By Blacks In Tech 0 Comments

BIT is proud to announce that we are official media sponsors for the USENIX Security Symposium bing held August 10-12 in Austin, TX.! Because of our partnership with USENIX, BIT will be selecting 2 members of the community to receive complimentary Read more…

SANS is looking for cybersecurity talent with SANS CyberTalent Fair

By Blacks In Tech 0 Comments

All interested professionals, jobseekers, and students – take a minute and check out the SANS CyberTalent Fair (SCTF), a virtualcareer fair hosted by the SANS Institute that will allow you to directly connect with employers about cybersecurity job opportunities in an online setting two Read more…

Bringing diversity to Bsides Tampa InfoSec conference – Up close with organizer, Derrick Thomas

By Blacks In Tech 1 Comment

Derrick Thomas is doing his part in tackling diversity in the Information Security world. He is the organizer of the BSides Tampa InfoSec conference in Tampa, Florida and an information security expert. He recently sat down with BIT so that Read more…

What no one at #IGF2014 is courageous enough to address about #childsafetyonline

By Ayori S. 1 Comment

Internet Global Forum was developed to discuss public policy issues related to key elements of Internet governance “in order to foster the sustainability, robustness, security, stability and development of the Internet” (among other key activities) through engaging with multiple stakeholders Read more…

#BITTechTalk episode #56 with guest Charles Nwatu

By Blacks In Tech 0 Comments

In this episode of the Blacks In Technology podcast, Greg and Ayori sit down with Information Security expert, Charles Nwatu. Listen in as we talk about Charles’ participation as a volunteer in Blacks Girls Code “Respect and Love” Hackathon in Read more…

BIT at Solid 2014: Where Hardware and Software Meet Everywhere

By dchayes 0 Comments

Solid is O’Reilly Media’s first conference wholly dedicated to the intersection of hardware and software around what is popularly referred to as IOT or the Internet of Things. Held at the Fort Mason Center in San Francisco, CA May 21 Read more…

DerbyCon – “All In The Family”

By Greg Greenlee 2 Comments

A couple of weekends ago I attended a conference called DerbyCon. DerbyCon is an Information Security conference held in Louisville, KY and features security talks, workshops, training and of course,  vendor schwag galore. This year is DerbyCon 3.0, meaning this Read more…

Security Tips and tools for the network admin: Security Onion Part 1

By Charles Tendell 1 Comment

Every day I run into system admins who know about security. Few are security professionals and often time they miss the little hints that might be lurking in the darkness of their own network. The number one threat to a Read more…

Don’t Be a Victim of a Phishing Attack

By Kellep Charles 0 Comments

Criminals and hackers have been extremely sophisticated in creating phony, but authentic looking e-mails that seemed to have originated from legitimate companies. If you receive an e-mail that you believe to be a phishing attempt, do not reply to it Read more…

#BITTechTalk episode #37 with guest Charles Tendell

By Blacks In Tech 0 Comments

In this episode of the Blacks In Technology podcast, Greg Greenlee sits down and speaks with Cyber security  expert Charles Tendell. Charles has several industry security certifications including the CEH (Certified Ethical Hacker), CHFI (Certified Hacking Forensics Investigation), and the Read more…

Google Chrome glitch causes wrong warnings

By Charles Tendell 0 Comments

DENVER — A glitch in Google’s Chrome browsing software is warning some users to stay away from some of the internet’s most popular websites including YouTube. The warning, which appears as a red screen with the message Danger: Malware Ahead, Read more…

A dose of Nagios pt.1

By Greg Greenlee 1 Comment

Hey that rhymed!!! OK, I couldn’t help myself, it’s the hip-hop in me. plus I’m excited to finally write about Nagios. I’ve used Nagios in my workplace for the past 5 years and have really become more intimate with the Read more…

Facebook Privacy settings How To

By Charles Tendell 1 Comment

I received a call late Sunday night from a family member. “Someone posted a picture on my FaceBook page” After logging into the page I noticed that many of the security and privacy features withing FaceBook weren’t enabled. FaceBook currently Read more…

Tunneling….it’s not just for rats

By Henry McKelvey 4 Comments

The information in this blog is about the use of tunneling as a tool for privacy. It is not meant to provide a way to bypass security. However, this is a way of allowing a person to offer access via a safe and some what acceptable way because direct access to the company’s assets would have been prevented. The Banner picture is a network I designed using the information I conveyed in this blog to allow remote testers to access a test environment and then send the code and test results to me at my company’s web site. This was done to provide 24/7 testing remotely. It worked great and I even got a promotion because of the concept. Continue reading

Tunneling is not just for rats

U.S. Gearing up for a cyber war?

By Charles Tendell 3 Comments

The United States has always been on the cutting edge of warfare. But a recent review of governing policy has revealed that the President has the authority to order preemptive cyber attacks on foreign entities with nothing more than a Read more…

An Overview of HoneyPots

By Kellep Charles 1 Comment

Honeypots are phony components set up to entice unauthorized users and malicious software (malware) by presenting numerous system vulnerabilities, while attempting to restrict unauthorized access to internal network information systems. A compromised honeypot system offers a wealth of features that Read more…

#BITTechTalk episode #28 with guest Kellep Charles

By Blacks In Tech 0 Comments

In this episode of the Blacks In Technology podcastGreg sits down again with IT Security Analyst and guru Kellep Charles. Kellep is  the creator and Executive Editor of (@SecurityOrb), an information security & privacy knowledge-based website with the mission to share and Read more…

#BITTechTalk episode #19 with guest Kellep Charles

By Blacks In Tech 0 Comments

In this episode of the Blacks In Technology podcast, Greg Greenlee along with guest co-host Ronnie Hash, speak with IT Security consultant and guru Kellep Charles. Kellep operates and is also an IT Security consultant for SecurityOrb , an information security knowledge based website for security Read more…

#BITTechTalk episode #11 with guest Keatron Evans

By Blacks In Tech 0 Comments

In this weeks episode of the Blacks In Technology podcast,  Ronnie and Greg sit down with Security guru, pentester,trainer,entrepreneur and author Keatron Evans. About Keatron: Keatron is the author of the Hackers/Pen-testing book “Chained Exploits:Advanced Hacking Attacks From Start to Finish”. He has sold close Read more…