Cyber Themed Drink Ideas to Help You Get in the Holiday Spirit – Security Boulevard

The Home of the Security Bloggers Network
Home » Security Bloggers Network » Cyber Themed Drink Ideas to Help You Get in the Holiday Spirit
Most of us look forward to the holiday season. Reconnecting with family, enjoying some well-deserved rest and indulging in wholesome homemade meals is all we want. But if you work in cybersecurity you know that this season is prime time for cyber attacks. Not to dig up old wounds, but remember Log4j from last year?
We want you to enjoy this time of the year the way it’s meant to be. And what better way to relieve your stress than with a refreshing beverage? So here’s a list of five cybersecurity inspired drinks for you to enjoy this holiday season.
Some malicious state actors are hard to stop, but when you’re wondering how to combat these attacks, do it with a White Russian in your hand. While the rest of the threat mitigations are hard to manage, you can take comfort in knowing that at least one Russian is totally under your control!
White Russian
In the unfortunate incident that you happen to be affected by a data breach, you are sure to be hit by a storm of vulnerabilities. While this incident would most certainly rock you like a hurricane, you might as well lean into the experience with a delicious concoction of rum and citrus!
Trickery has been a part of society since forever. In the early days they were called pranks and now we call it phishing! Recent history is proof that this season is prime time for phishing attacks. So while you sort through all the phishing attempts made towards your organization, what better drink to enjoy than Tom Collins – a drink that came to be purely because of trickery:
It’s 19th century New York, a middle aged man rides in on his horse and stops for a quick break under the shaded canopy of a tavern. A young man walks out of the bar and says, “Hey! That Tom Collins fellow has been talking smack about you all day, are you here to show him his place?”. Shocked at this new information the middle aged man says “I don’t know a Tom Collins. What’s his beef with me?”. The young man further informs him that Tom Collins has been talking some serious trash about him, and while he’s not sure of his current whereabouts, he was last seen inside that very bar.
Prepared to punch Tom Collins the man pulls up his sleeves and heads into the bar, goes straight to the bartender and asks, “Where’s Tom Collins? I want to see him right away!”
Straight-faced, the bartender simply nods, holds up his index finger in a “just a minute” gesture. He grabs a glass and starts mixing gin, lemon juice, soda water and some simple syrup. The man looks around in disbelief as the bartender slides the drink in front of him. “That”, he says, pointing at the cocktail, “is Tom Collins”. He hands the man a receipt and walks away, and the bar erupts in uproarious laughter.
The man was stuck being pranked and having to pay the bill.
Tom Collins
Signature-based attacks are very ‘old school’. When your antivirus detects malicious activity and you combat this signature based attack successfully, celebrate a classic cybersecurity moment with a class drink – an Old Fashioned! Take a breather from worrying about more sophisticated modern attacks.
Old Fashioned
We realize cybersecurity isn’t an easy task. The next time you are buried under a hundred critical vulnerabilities take a mental trip to the beach. Enjoy a Tequila Sunrise and feel the sand between your toes!
Tequila Sunrise

*** This is a Security Bloggers Network syndicated blog from Blog – Balbix authored by Deepika Dsouza. Read the original post at:
More Webinars
Security Boulevard Logo White

Step 1 of 6

Are you worried about software supply chain attacks?

Which of these do you include as part of your software supply chain security analysis today?

Do you currently produce software bill of materials (SBOMs) for your applications?
Of those SBOMs produced, how many are published?

What are the main drivers for using SBOM? (select all that apply)

What are the key factors considered in your selection of open-source packages? (select all that apply)

How do you secure the open-source software used in your applications? (select all that apply)

document.getElementById( “ak_js_1” ).setAttribute( “value”, ( new Date() ).getTime() );

gform.initializeOnLoaded( function() {gformInitSpinner( 20, ‘’ );jQuery(‘#gform_ajax_frame_20’).on(‘load’,function(){var contents = jQuery(this).contents().find(‘*’).html();var is_postback = contents.indexOf(‘GF_AJAX_POSTBACK’) >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find(‘#gform_wrapper_20’);var is_confirmation = jQuery(this).contents().find(‘#gform_confirmation_wrapper_20’).length > 0;var is_redirect = contents.indexOf(‘gformRedirect(){‘) >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery(‘html’).css(‘margin-top’), 10) + parseInt(jQuery(‘body’).css(‘margin-top’), 10) + 100;if(is_form){jQuery(‘#gform_wrapper_20’).html(form_content.html());if(form_content.hasClass(‘gform_validation_error’)){jQuery(‘#gform_wrapper_20’).addClass(‘gform_validation_error’);} else {jQuery(‘#gform_wrapper_20’).removeClass(‘gform_validation_error’);}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */ jQuery(document).scrollTop(jQuery(‘#gform_wrapper_20’).offset().top – mt); }, 50 );if(window[‘gformInitDatepicker’]) {gformInitDatepicker();}if(window[‘gformInitPriceFields’]) {gformInitPriceFields();}var current_page = jQuery(‘#gform_source_page_number_20’).val();gformInitSpinner( 20, ‘’ );jQuery(document).trigger(‘gform_page_loaded’, [20, current_page]);window[‘gf_submitting_20’] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find(‘.GF_AJAX_POSTBACK’).html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery(‘#gform_wrapper_20’).replaceWith(confirmation_content);jQuery(document).scrollTop(jQuery(‘#gf_20’).offset().top – mt);jQuery(document).trigger(‘gform_confirmation_loaded’, [20]);window[‘gf_submitting_20’] = false;wp.a11y.speak(jQuery(‘#gform_confirmation_message_20’).text());}, 50);}else{jQuery(‘#gform_20’).append(contents);if(window[‘gformRedirect’]) {gformRedirect();}}jQuery(document).trigger(‘gform_post_render’, [20, current_page]);} );} );

Step 1 of 6
document.getElementById( “ak_js_1” ).setAttribute( “value”, ( new Date() ).getTime() );


Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button