Security Training

1de705dde1cf97450678321cd77853d9

Hardening Is Hard If You're Doing It Right

March 20, 2013 Added by:Ian Tibble

The early days of deciding what to do with the risk will be slow and difficult and there might even be some feisty exchanges, but eventually, addressing the risk becomes a mature, documented process that almost melts into the background hum of the machinery of a business.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Ben Rothke on the Five Habits of Highly Secure Organizations

March 18, 2013 Added by:Tripwire Inc

There are five habits of highly secure organizations, said Ben Rothke (@benrothke), Manager – Corporate Services Information Security at Wyndham Worldwide.

Comments  (1)

Da3ca2c61c4790bcbd81ebf28318d10a

So APT Is China *snicker* Now What?

February 28, 2013 Added by:Krypt3ia

As RSA comes to a close and the corridors of the hall stop ringing with the acronym APT, I find myself once again looking at the problem as opposed to the hype.

Comments  (0)

306708aaf995cf6a77d3083885b60907

China's PLA Behind Massive Cyber Espionage Operation

February 19, 2013 Added by:Mike Lennon

In a fascinating, unprecedented, and statistics-packed report, security firm Mandiant made direct allegations and exposed a multi-year, massive cyber espionage campaign that they say with confidence is the work of China.

Comments  (0)

37d5f81e2277051bc17116221040d51c

What We Learned About Digital Security In 2012

February 12, 2013 Added by:Robert Siciliano

Sometimes it’s the worst things that can happen that become the eye-opening best things that effect positive change. The year 2012 saw numerous high-profile data breaches, epic hacks, full-on hacktivism and lots of major identity theft ring busts.

Comments  (0)

Default-avatar

New York Times Attacks Show Need For New Security Defenses

February 01, 2013 Added by:Infosec Island

The recent attacks against the New York Times allegedly carried out by the Chinese military highlight the importance of layered security to protect sensitive systems and data.

Comments  (0)

Default-avatar

New York Times Says It Was Infiltrated By Chinese Hackers

January 31, 2013 Added by:Infosec Island

The New York Times said it had fallen victim to hackers possibly connected to China's military, linking the sophisticated attacks to its expose of the vast wealth amassed by Premier Wen Jiabao's family.

Comments  (0)

Default-avatar

Resource: Defeating Advanced Persistent Threat Malware

January 29, 2013 Added by:Infosec Island

Attacks can come from anywhere. Even more daunting is that not all malware is alike. Learn about battling advanced threats and the progressive strategies to battle malware from this new white paper.

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Get Your Security BSides On In San Francisco

January 24, 2013 Added by:Security BSides

The goal of Security BSides is to expand the spectrum of conversation beyond the traditional confines of space and time. The conferences create opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration...

Comments  (1)

8a958994958cdf24f0dc051edfe29462

Common Sense Cybersecurity

January 13, 2013 Added by:Larry Karisny

We start with one big problem. Internet architecture was never made for security. One of my earliest articles quoted the father of the Internet Vint Cerf by saying, "One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet."

Comments  (0)

942a200514c2a9d79858ce6355c40614

Executive Viewpoint 2013: Avecto

December 29, 2012 Added by:Paul Kenyon

With technology now available that allows even a true administrator to log in with standard user rights and do their role without ever needing a privilege account, we will start to see more and more organizations adopt a least privilege approach to computing...

Comments  (1)

Ff632049ba1218ecd55b8122b2112642

Maintain the Combat Stance

December 26, 2012 Added by:Randall Frietzsche

When I was studying for my CISSP, I had to either learn or become reacquainted with ten domains of information security. Even though I may not use it on a daily basis, the CISSP exam would test me on my knowledge and understanding of all areas - I didn't need to be an expert but I needed to be acquainted with every art...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Do Better Technical Controls Increase People Focused Attacks?

December 16, 2012 Added by:Simon Moffatt

Social engineering can be seen as a more direct approach to exposing real security assets such as passwords, processes, keys and so on. Via subtle manipulation, carefully planned framing and scenario attacks, through to friending and spear phishing, people are increasingly becoming the main target...

Comments  (0)

942a200514c2a9d79858ce6355c40614

Managing the Social Impact of Least Privilege

December 10, 2012 Added by:Paul Kenyon

In organizations where IT policy hasn’t been enforced or where users expect to have full autonomy over PCs, the transition to least privilege desktops must be carefully planned, so the IT department doesn’t face a user revolt. Make sure to set users’ expectations accordingly...

Comments  (0)

Bddcc5065237c686cb4d89dba8b276f2

Organizational Influence via Security Team Branding

December 09, 2012 Added by:Steven Fox, CISSP, QSA

Hacker Halted 2012 was full of personalities; executives, technologists, students and security enthusiasts – each one with stories that fueled conversations and debate. Technical and business erudition dominated the speaker sessions and the hacking competitions...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Information Security: Why Bother?

December 09, 2012 Added by:Simon Moffatt

The question, often raised as a bargaining tool, is often focused on the, ‘well I understand what you propose and I know it will increase the security of scenario X, but why should I do it?’. In honesty, it is a good question...

Comments  (3)

Page « < 8 - 9 - 10 - 11 - 12 > »