CyberSecurity Blog

Fountainhead's CyberSecurity Blog connects our community by sharing current events, news and trends in the industry. Join the discussion!


Securing and Attacking the HTML5 Landscape

infragard_IMA_logo1-smKnoxville InfraGard Chapter Meeting

Securing and Attacking the HTML5 Landscape will be the topic of this InfraGard Knoxville chapter meeting on Thursday, May 22 from 11:30 am - 1:00 pm at Fountainhead College. This meeting is free and open to the public.

Our guest speaker will be Blake Hitchcock of Cisco Systems, Inc. He describes his talk as follows:

HTML5“Though HTML5 is still in Candidate Recommendation status, many of the proposed features are well supported by the major browser vendors and are becoming more and more common in web applications. As with any new feature set, HTML5 introduces a new class of vulnerabilities and exploit possibilities. It also provides functionality that, when used properly, can harden the security of web applications. This talk will focus on features such as Web Messaging, CORS, client Storage APIs, sandboxing, HTTP security headers, and other topics of interest related to HTML5 security. I will discuss how to use these features securely as well as how to attack and assess the security of an application using these technologies. “

Blake Hitchcock has been building and breaking web applications for 4 years with Cisco. He loves writing in Ruby and JavaScript, and 'Burp' is not just something he does after a few too many kielbasas. When he's not doing web stuff, Blake enjoys fitness, good food, sports, and cheering for his beloved Volunteers.

InfraGard Knoxville Members Alliance

The mission of the Infragard East Tennessee Members Alliance is to educate and inform our region's businesses, organizations, law enforcement agencies, educational institutions, as well as private citizens on issues surrounding cybercrime and security. The East Tennessee Infragard Chapter is a 501c nonprofit organization, and is one part of a national networked organization called InfraGard.

Directions to Fountainhead College:


Jihadist Terrorism to be discussed at InfraGard meeting

Knoxville InfraGard Chapter Meeting


FBI Intelligence Analysts will discuss internet jihadists and insider threats at the next InfraGard Chapter meeting on Thursday, May 9th, at 4:30 pm at the Fountainhead College of Technology's campus at 10208 Technology Drive in West Knoxville. (See map below.)

This is an open meeting, so visitors are welcome.

During the last decade the greatest terrorist threat has comes from what is referred to as 'jihadist terrorism'. Certainly since 11 September 2001, many bloody terrorist attacks have been carried out under pretext of a religious armed struggle, known as the 'jihad'.


Security Professional Training Program

Cissp-logoAre you considering taking the CISSP exam in 2013? 

The SANS® +S™ Training Program for the CISSP® Certification Exam is designed to prepare you to pass the exam. This course is an accelerated review course that assumes the student has a basic understanding of networks and operating systems and focuses solely on the ten domains of knowledge as determined by (ISC)2.*

Starting April 30, 2013, you can prepare for the CISSP exam with The SANS Institute's Mentor program right here in Knoxville. This class is an accelerated review course that focuses on the ten domains of knowledge defined by ISC2. Each domain is dissected into its critical components, and every component is discussed in-depth. Test-taking tipsand strategies are also covered.

Class Dates: April 30 - June 2013

Time: 6:00-8:00PM once a week, over 10 Tuesday evening sessions 

Tuition: $3400 (Fountainhead students and faculty receive a 10%+ discount)

Registration information:

Class Location: Fountainhead College of Technology

Instructor: Richard Clowers, graduate and former instructor at Fountainhead College


NIST updates, expands glossary of security terms


The NIST Glossary of Key Information Security terms is a reference resource. The key points mentioned in the article relate to its usefulness in examining CNSS and NIST documents. The benefit for students and professionals in Network Security and Information Assurance is when the NIST Glossary is used in conjunction with the NIST NICE Framework.


NIST Updates, Expands Glossary of Security Terms

By William Jackson Dec 11, 2012

The National Institute of Standards and Technology is updating its Glossary of Key Information Security terms, and has released a draft of the latest revision(PDF) of Interagency Report 7298.

The glossary contains more than 200 pages of definitions, from “Access” (the ability to make use of any information system resource) to “Zone of Control” (the three-dimensional space surrounding equipment that processes classified and/or sensitive information). It defines the responsibilities of the chief information officer and describes the Security Content Automation Protocol (SCAP) as well as its specifications and languages.


Websites Seized in Cyber Monday

So You Think That You Got a Great Deal...


The following article offers a caution when purchasing those inticement deals that appear too good to be true. Always check out who you are purchasing from prior to proceeding with the commit button. Unfortunately, discounted products may look genuine as fraudulent companies manufacture stolen ideas that are forgeries. Who suffers besides the consumer ordering? We all do as a Nation as our intellectual property is targeted by those adversaries, who feel no compunction in violating intellectual property rights. Remember, durable goods are not the only items targeted, ineffective medicines can be also marketed as the genuine articles.


Government Hackers Train for Attacks

So You Say that You Want to Get in the CyberFIGHT...

washington_post_logoEveryone needs a place to get good at what they do. How will CyberWarriors get realistic training situations for potential conflicts? The answer is Cyber Ranges. These virualized environments allow the simulation of millions of users, along with the Critical Infrastructure of a city or country. By gaining knowledge of defending against simulated attacks, we can better understand how our defenses will fare. On the other hand, where is the fun in just being a defender of a target? Cyber Warriors will be play a critical role in future warfare and will need to have the understanding of their potential targets, if a conflict escalates. 

CyberCity allows government hackers to train for attacks

(by Robert O'Harrow, Jr. at The Washington Post on 11/26/2012)


University Teaches Cyber Espionage

Bond...Tech Bond. University of Tulsa Teaching Cyber Espionage...


Ahh... some Open Source information enters the picture regarding the mission of the Cyber Operations designated academic institutions. Originally, the Cyber Operations designation was slated to be placed under the Centers of Academic Excellence in Information Assurance Education. However, due to the funding source the US Congress decided that the designation required a degree of separation. Read on for a glimpse behind the curtain known as Cyber Operations.

University Of Tulsa Offers Course Training Students In Online Espionage

 (by James Gilbert of Elite Daily from the Huffington Post on 11/26/2012)

Back to Top