Used by security practitioners and organizations all around the world The Security Awareness Cycle is a process methodology that provides a holistic approach to security awareness by focusing on changing high-risk behaviors and reinforcing desired behaviors.
Tom’s Hash Explorer v1.2: Now with Batch File Verification I am happy to announce that Tom’s Hash Explorer v1.2 is released and available for download from the application’s homepage. The most significant update in this release is the introduction of...read more
If you have been using Tom’s AD Bitlocker Password Audit, but are looking for a version that can be used in an automated fashion either via Scheduled Tasks or with other scripting wait no longer. I’ve just released a free open-source version called...read more
I have received quite a few reports of corrupted downloads over the past few weeks. I believe this is caused by some sort of conflict between the Download Manager plugin and my hosting provider without being able to definitely prove this. I have removed the Download...read more
I am happy to announce that Tom’s Hash Explorer v1.1 is available for download. The new version features skinned themes, drag and drop support for both single files and folders, and the ability to calculate the entropy of files using Shannon’s Entropy....read more
I am so bummed that I will be missing The Security Culture Conference 2016 which is happening in my home town of Oslo, Norway, June 14th and 15th this year. If you are passionate about security awareness and security culture I highly recommend that you check it out....read more
Tom’s AD Object Recovery is a free Windows utility for querying your Active Directory for deleted computer, user, group, or other objects and restore them on-the-fly. After a few months of working on this project I am glad to announce the first release of Tom’s...read more
Welcome to my website! I created this site as a platform to share my contributions to the information technology and information security communities. You may have arrived here because you have come across one of my freeware applications or perhaps you have seen my commentary somewhere on some security forum. I frequently contribute to security related discussions online both here and overseas, especially around the topics of Digital Forensics and Incident Response (#DFIR), Security Auditing, and around Security Awareness. I hope that you will find the content and resources on the site to be worthwhile and I welcome any comments and discussions.
After the organization have defined its overall security strategy, created and implemented security policies and procedures, defined security roles and responsibilities, and secured management support for a security awareness or security culture program it is time to...read more
In order to create and foster a security conscious culture within our organizations it is essential that we first lay the foundation for which to build upon. Just like we would not build a house or a building without a solid foundation to place the remaining structure...read more
Society is changing rapidly and organizations increasingly interconnect in order to keep up with customer demands. The increased use of the Internet to conduct business, the transition from paper to digital media, the increased use of social networks, and the cloud...read more