• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

You Got Your Walking Dead in My Cyber Security

March 18, 2014 By Corey Nachreiner

Keep Calm and Eat Pudding

Sometimes two things that don’t seem to go together, make the most magical combinations; things like peanut butter and chocolate, maple and bacon, and even Jon Snow and Ygritte. In hopes of adding to such delightful duos, I have started a new series of security articles trying to uncover another unexpected pairing—information security and pop culture.

What can popular movies, TV shows, books, or video games teach us about cyber security? Maybe nothing, maybe everything. In my new Help Net Security series, I plan to see if your favorite guilty pleasures can uncover any cyber security insights you’d never have expected. Join me for my first article at Help Net Security, where I share eight information security tips I learned from The Walking Dead (TWD).

  • Eight Cyber Security Tips I Learned from The Walking Dead – Help Net Security

By the way, if you like the article, or you love The Walking Dead, feel to share some TWD cyber security tips of your own? Come back here and add your own interesting infosec parallels to the comments section below. Feel free to draw parallels to other pop culture media too! — Corey Nachreiner, CISSP (@SecAdept)

Share This:

Related

Filed Under: Uncategorized Tagged With: Help Net Security, Infosec news, Security Tips, The Walking Dead

Comments

  1. Ryan says

    March 18, 2014 at 10:08 am

    Great read, Corey! Looking forward to more…

    Reply
    • Corey Nachreiner says

      March 18, 2014 at 10:31 am

      Thanks Ryan, it was fun to write… considering lots of other media… Breaking Bad, The Walking Dead, Skyrim, House of Cards, etc…

      Reply
      • Ryan says

        March 18, 2014 at 11:54 am

        XCOM? 😉

        Reply
      • Corey Nachreiner says

        March 18, 2014 at 12:51 pm

        heh, that would be fun too… By the way, have you seen this Ryan (based on our past web server attack discussions):

        http://thehackernews.com/2014/03/operation-windigo-linux-malware.html

        Reply
      • Ryan says

        March 18, 2014 at 1:58 pm

        Yep, I did see that. Seems to be a trend of news on Linux these days. I checked and my servers are clean. Of course, it might have to with the fact that I harden them so much that it’s almost annoying for me to work with them! 😉

        Reply
  2. George Jones says

    March 18, 2014 at 11:21 am

    Quick and fun read. Totally on target. I will watch TWD with slightly differentb perspective!

    Reply
    • Corey Nachreiner says

      March 18, 2014 at 12:52 pm

      Thank you. It has me watching all my favorite guilty pleasures a little differently. I’ve already come up with a few tips based on Breaking Bad.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • The Qakbot Takedown
  • iPhone’s Latest 0-Day
  • Meta’ One Good Deed

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Meta’ One Good Deed
  • iPhone’s Latest 0-Day
  • The Qakbot Takedown
  • Weaponizing WinRAR
  • U.S. Cyber Trust Mark
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use