• Boot camps & training
  • Awareness & anti-phishing
  • Community
    • Topics
    • Certification Prep
    • Cyber Work
    • About us
    • Back
    • Industry insights
    • Phishing
    • Hacking
    • Capture the flag (CTF)
    • Professional development
    • Security awareness
    • Penetration testing
    • Cyber ranges
    • General security
    • Management & compliance
    • Malware analysis
    • MITRE ATT&CK™
    • News
    • Application security
    • Digital forensics
    • View all
    • Back
    • Back
    • (ISC)² CISSP
    • (ISC)² CCSP
    • (ISC)² CAP
    • Cisco CCNA
    • CMMC
    • CompTIA A+
    • CompTIA Network+
    • CompTIA Security+
    • CompTIA CySA+
    • CompTIA PenTest+
    • CompTIA CASP+
    • EC-Council CEH
    • ISACA CDPSE
    • ISACA CGEIT
    • ISACA CISA
    • ISACA CISM
    • ISACA CRISC
    • Microsoft Azure
    • PMP
    • View all
    • Back
    • Cyber Work Podcast
    • Cyber Work Live
    • Back
    • Contact us
    • Contributors

Robert Barnes

Rob Barnes is a software security architect specializing in web application security, pen testing, risk management, and threat modeling. He holds CISSP, CSSLP, and CEH certifications and has a master’s degree in information security. His passion is helping customers understand and manage risk by framing security in the context of business impact.

Phishing February 5, 2014 Robert Barnes

Hidden Phishing Threats

By now, the risks associated with phishing are well-known and well-documented. What is often misunderstood or overlooked is a hidden threat related to phishing. There...
Management, compliance & auditing September 20, 2013 Robert Barnes

Conditional Complexity of Risk Models

Introduction "Conditional complexity" (also called cyclomatic complexity) is a term used to measure the complexity of software. The term refers to the number...
Digital forensics August 8, 2013 Robert Barnes

Geocoding Router Log Data

Any good piece of malware eventually has to phone home. What good is collecting your dirty little secrets if it can't capitalize on them? This article will...
Infosec logo

Topics

Hacking Penetration testing Cyber ranges Capture the flag Malware analysis Professional development General security News Security awareness Phishing Management, compliance & auditing Digital forensics Threat intelligence DoD 8570 View all topics

Certifications

CISSP CCSP CGEIT CEH CCNA CISA CISM CRISC A+ Network+ Security+ CASP+ PMP CySA+ CMMC Microsoft Azure View all certifications

Careers

IT auditor Cybersecurity architect Cybercrime investigator Penetration tester Cybersecurity consultant Cybersecurity analyst Cybersecurity engineer Cybersecurity manager Incident responder Information security auditor Information security manager View all careers

Company

Contact us About Infosec Work at Infosec Newsroom Partner program
  • Infosec, part of Cengage Group — ©2023 Infosec Institute, Inc.
    • Trademarks
    • Privacy Policy