Security Training

5a8300df8aa4169096932e433ec884b5

Why doesn't your VPN work on the road?

October 29, 2012 Added by:Rainer Enders

With the ubiquity of mobile devices, staying securely connected to work - in theory - should require nothing more than an internet connection, and seemingly everywhere you travel, whether that be in hotels, airports, or conference trade shows, offer such connections. But the reality is more complicate...

Comments  (0)

099757b145caa6965ea51494adbc25ba

Ways You Can Secure Your Network

October 25, 2012 Added by:Drayton Graham

If you are looking to secure your network, there is more than one way to do it. A NAC solution may still be the best bet for a number of companies, but when budget and resources are limited, RJ-45 jack locks may prove a creative, inexpensive solution...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

CISSP for Dummies

October 24, 2012 Added by:Ben Rothke

The CISSP is the most popular and arguably most valuable information security certification. While SANS GIAC certifications are technically more intensive, the CISSP is the 900-pound gorilla of information security certifications. For those looking review guide, CISSP for Dummies is a worthwhile reference...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Impressive Speaker Lineup Announced for TECHEXPO Cyber Security Event

October 23, 2012 Added by:Infosec Island Admin

"Our team is extremely pleased with the high caliber, diversity and expertise of the confirmed speakers we have secured for this event. Having such a dynamic lineup of highly respected industry professionals to share their knowledge and inspire those seeking employment..."

Comments  (0)

942a200514c2a9d79858ce6355c40614

The Balancing Act: How Universities Can Prevent Malware and Enable Information Access

October 21, 2012 Added by:Paul Kenyon

Considering most universities must accommodate a network of thousands of desktops and laptops, in addition to end-users ranging from students, developers, researchers, academics and admin staff – it’s no wonder balancing security and productivity is such a complex endeavor...

Comments  (1)

942a200514c2a9d79858ce6355c40614

Top Ten Ways to Prevent Data Breaches

October 11, 2012 Added by:Paul Kenyon

Users with admin rights are loose cannons -- you just don’t know when or where they are going to strike, and the results can be devastating to the company’s security infrastructure. Once a problem occurs, it often unravels into a downward spiral taking your business - and reputation - down with it...

Comments  (3)

5b4dab10939f37f8bee4017c584353fe

Don't Be a Con (Insert Favorite Term for Jerk Here)

October 07, 2012 Added by:Philip Polstra

While ours is a friendly community, I did observe my share of bad behavior from a small minority in our community. So here is my short list of ways you can avoid being a (jerk term) at a con. If we all were to follow even these 4 simple rules the infosec world would be a better place...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

On Security Conference Mania

September 30, 2012 Added by:Fergal Glynn

From giant industry events, analyst events, regional events, hacker cons, to any kind of gathering you can think of including conferences on boats, trains, and buses. At any given time, you can find a security conference happening. What is it about the industry that loves an event?

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Rediscovering Our Way: OWASP AppSec Ireland 2012

September 20, 2012 Added by:Rafal Los

We can't expect the OWASP community to continue forward as a collection of application-security focused professionals without developer outreach, education, and more outreach. Application (and software) security isn't about security people at all, it's about developers...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

SOURCESeattle Write-Up

September 18, 2012 Added by:Robert M. Lee

As my perspective in infosec comes from my role as a Cyberspace Operations Officer in the Air Force, where most people say “infosec” I say “cyber” and try to speak on the broader domain impacts, deterrence, sharing threat intelligence, education, and the importance of working together...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Four Horsemen of the Infosec Apocalypse and the Freak Power Ticket

September 18, 2012 Added by:Infosec Island Admin

All of this will be tempered by what happens next for Dave and Chris. Will they be able to penetrate the old boy network? Will they be able to, once ensconced in the ISC(2) inner sanctum, make any kinds of change that would make the CISSP more meaningful? Time will tell my friends...

Comments  (1)

32137b352537f11c1efe063869f00e0e

Four Days and Counting for (ISC)2 BoD Petitioners

September 13, 2012 Added by:Le Grecs

The same "good 'ol boys/girls" keep returning time and time again. When their terms are up, they "sit out a year" and then the next board nominates them as one of the BoD-recommended candidates. Keeping the same old board will result in a certification that continues to be disconnected...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Microsoft BlueHat: Five Questions with Katie Moussouris

September 12, 2012 Added by:Fergal Glynn

One of the big stories from this year’s BlackHat conference was Microsoft’s inaugural BlueHat contest which challenged researchers to design a novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities. Katie Moussouris discusses...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Scot Terban ISC(2) Board Petition UPDATE

September 05, 2012 Added by:Infosec Island Admin

It seems that when one “petitions” to run for the board, one must have the signatories send an email instead of just fill out their information on some excel sheet or online petition. If you are wanting to sign the petition for my being able to run for the BoD please email me...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Real World Information Security

September 05, 2012 Added by:Tripwire Inc

Alex uncovered a poorly designed web page and convinced it to give up its secrets. What followed was a quick RDP war trying to plant our backdoor. I found myself with root level access having blasted away at it using Metasploit and uncovered several Easter eggs instructors had planted...

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

Infosec Recruiters Examine Security Career Trends

August 30, 2012 Added by:InfoSec Institute

"Penetration testers, the guys that come onto the sites—they’re highly in demand... In terms of technology, I think these guys see security in a different light than other people. They sort of can see it as a whole picture. Penetration testers are looking at it in a completely different light...."

Comments  (3)

Page « < 8 - 9 - 10 - 11 - 12 > »