Security Training

Bbb285308604bc5fbb9b43590d0501f6

Get Your Security BSides On In San Francisco

January 24, 2013 Added by:Security BSides

The goal of Security BSides is to expand the spectrum of conversation beyond the traditional confines of space and time. The conferences create opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration...

Comments  (1)

8a958994958cdf24f0dc051edfe29462

Common Sense Cybersecurity

January 13, 2013 Added by:Larry Karisny

We start with one big problem. Internet architecture was never made for security. One of my earliest articles quoted the father of the Internet Vint Cerf by saying, "One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet."

Comments  (0)

942a200514c2a9d79858ce6355c40614

Executive Viewpoint 2013: Avecto

December 29, 2012 Added by:Paul Kenyon

With technology now available that allows even a true administrator to log in with standard user rights and do their role without ever needing a privilege account, we will start to see more and more organizations adopt a least privilege approach to computing...

Comments  (1)

Ff632049ba1218ecd55b8122b2112642

Maintain the Combat Stance

December 26, 2012 Added by:Randall Frietzsche

When I was studying for my CISSP, I had to either learn or become reacquainted with ten domains of information security. Even though I may not use it on a daily basis, the CISSP exam would test me on my knowledge and understanding of all areas - I didn't need to be an expert but I needed to be acquainted with every art...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Do Better Technical Controls Increase People Focused Attacks?

December 16, 2012 Added by:Simon Moffatt

Social engineering can be seen as a more direct approach to exposing real security assets such as passwords, processes, keys and so on. Via subtle manipulation, carefully planned framing and scenario attacks, through to friending and spear phishing, people are increasingly becoming the main target...

Comments  (0)

942a200514c2a9d79858ce6355c40614

Managing the Social Impact of Least Privilege

December 10, 2012 Added by:Paul Kenyon

In organizations where IT policy hasn’t been enforced or where users expect to have full autonomy over PCs, the transition to least privilege desktops must be carefully planned, so the IT department doesn’t face a user revolt. Make sure to set users’ expectations accordingly...

Comments  (0)

Bddcc5065237c686cb4d89dba8b276f2

Organizational Influence via Security Team Branding

December 09, 2012 Added by:Steven Fox, CISSP, QSA

Hacker Halted 2012 was full of personalities; executives, technologists, students and security enthusiasts – each one with stories that fueled conversations and debate. Technical and business erudition dominated the speaker sessions and the hacking competitions...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Information Security: Why Bother?

December 09, 2012 Added by:Simon Moffatt

The question, often raised as a bargaining tool, is often focused on the, ‘well I understand what you propose and I know it will increase the security of scenario X, but why should I do it?’. In honesty, it is a good question...

Comments  (3)

8e6e3972318ff74b194801340248199e

Security Job Titles

December 04, 2012 Added by:Scott Thomas

You may be listed as the 'Security Guru' in a large company but if all you're doing is making sure everyone is swiping their ID badge as they walk in, it may not be the job for you...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Why I'm Upset About the S.C. Department of Revenue Breach

December 04, 2012 Added by:Kelly Colgan

I’m a South Carolina taxpayer, and therefore, a potential victim of the massive South Carolina Department of Revenue Breach. I work in the identity theft and data risk industry, so when I heard about how everything was being handled and what was being offered, I was upset...

Comments  (2)

65c1700fde3e9a94cc060a7e3777287c

Preventative -v- Detective Security

December 02, 2012 Added by:Simon Moffatt

Security has several issues from a proactive implementation perspective. Like anything, a detailed return on investment, including both tangible and non-tangible benefits, is required...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Wargames on a New Level - Hackfest.CA in Quebec City

December 02, 2012 Added by:Rafal Los

When I was asked to come out to Quebec for a conference called Hackfest.CA, I was interested because this isn't a conference I had heard of, and it wasn't on my radar. Additionally, the name suggests it's geared towards the 'hackers' and quite frankly, I'm fairly out of practice...

Comments  (0)

85e4e9d32348a15d6995085986881f2b

BSidesJackson 2012: A Brand Spanking New Infosec Community

November 27, 2012 Added by:Chris Sistrunk

BSidesJackson was the 1st infosec conference to be held in Mississippi. I organized BSidesJackson because I believe in infosec, and I also believe that having a local infosec community is essential...no matter where you work or what type of information/networks you must protect...

Comments  (0)

094983f35f079e5bd15fdc2f9ce9297c

Become a Computer Forensics Expert and earn £100k a year

November 26, 2012 Added by:Edward Jones

As a branch of digital forensics science, computer forensics is the legal evidence collection process in computers, mobile devices, applications and digital storage media. The goal is to collect, examine, identify, preserve, recover, analyse and present evidence...

Comments  (0)

942a200514c2a9d79858ce6355c40614

Why Least Privilege Management is Essential to the new NIST Risk Assessment Guidelines

November 13, 2012 Added by:Paul Kenyon

NIST guidelines that were updated last mont, make multiple references to privileged users and/or administrators, who are deemed both major threat sources and enablers of risky events. When it comes to these standards, taking a least privilege approach to security is a major step towards protecting organizations...

Comments  (1)

5a8300df8aa4169096932e433ec884b5

BYOD savings may be lost by security and admin costs

November 12, 2012 Added by:Rainer Enders

Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort. In reality, BYOD is just one of the ways enterprises can mobilize, and in many cases, it is not the most secure, or necessarily the most cost-efficient way to do so...

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »