Security Training


CISSP Reloaded Domain 4: Cryptography

March 28, 2012 Added by:Javvad Malik

Cryptography, the dark art of information security. The deus-ex-machina, the silver bullet, the be all and end all of all security measures, so profound cryptography was first classed as a munitions. Widely misunderstood, often poorly implemented...

Comments  (1)


CyberPatriot Announces National Championship Winners

March 27, 2012 Added by:Headlines

“CyberPatriot has introduced the area of cyber defense to tens of thousands of students across the country, and they’ve embraced the opportunity to learn and develop the skills to be successful in a field critical to America,” said Bernie Skoch, CyberPatriot Commissioner...

Comments  (0)


Pitting Education Against Cyber Attacks

March 26, 2012 Added by:Frank Kim

In the relentless struggle to protect against cyber attacks, companies must identify vulnerabilities before hackers have an opportunity to exploit them. With software applications, a logical path to the early identification of vulnerabilities begins at the development stage...

Comments  (0)


ISA / ANSI: Financial Impact of Breached Health Information

March 20, 2012 Added by:Marjorie Morgan

Webinar participants will hear from industry experts who will highlight strategies for health care organizations and findings from the recently released report, The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security...

Comments  (0)


Black Hat Europe 2012 Roundup

March 20, 2012 Added by:Javvad Malik

An underlying theme throughout the event from nearly everyone I spoke to was that people are still neglecting the basics. Rafal Los and Shane MacDougall gave an interesting talk on offensive threat modeling for attackers where they took the attackers viewpoint on threats...

Comments  (0)


CISSP Reloaded Domain Three: Telecoms and Network Security

March 19, 2012 Added by:Javvad Malik

Network security is so important yet because it’s complex, a lot of companies end up doing it wrong. Not as many people properly understand the security implications of the network and most companies don’t even know what their network is comprised of...

Comments  (1)


Three Key Take-Aways from Black Hat Europe 2012

March 18, 2012 Added by:Rafal Los

Every year we see tons of new development frameworks from IP telephony to something else the business wants - mobility, cloud, consumerization - that information security professionals only start to address and understand just as they're starting to go out of style...

Comments  (0)


What Do You Call a BlackHat in Amsterdam?

March 16, 2012 Added by:Javvad Malik

It was my first BlackHat and I’d agreed to cover the event for Infosec Island. Those in attendance would have seen me with Jim Shields of Twist & Shout lugging around camera’s lights, microphones trying to convince people to say a few words to the camera...

Comments  (1)


Security BSides Charleston 2012: Operating In-Security

March 16, 2012 Added by:Security BSides

A combination of students, professionals, geeks and tinkerers gathering to discuss Information Security, hear awesome talks and bring security into our everyday lives. Our mission is to provide an inclusive, inspiring and motivational environment to discuss and collaborate...

Comments  (0)


A Post BSidesSF and RSA Post

March 15, 2012 Added by:Jack Daniel

The RSA Conference was the RSA Conference. It was better than the past few years as far as content. It is not the place for cutting edge research, and the expo is all about selling security products. It can be disillusioning to see the crass commercial side of our business...

Comments  (1)


Don't Miss the TECHEXPO Cyber Security Hiring Event

March 13, 2012 Added by:Infosec Island Admin

Are you a Cyber Warrior and seeking a new employment opportunity? Don't miss the TECHEXPO Cyber Security hiring event March 20th. Bring resumes and interview for the many opportunities, and learn from our guest speakers William M. Jimenez, Paul de Souza, and Richard Bejtlich...

Comments  (0)


The Security BSides Las Vegas Mentorship Program

March 08, 2012 Added by:Security BSides

We all know how hard it can be to find your voice, or translate data into talking points that won't lose your audience, so we're looking to pair first time conference speakers with a mentor who has a solid track record in public speaking to work with them from CFP to the podium...

Comments  (0)


CISSP Reloaded - Domain Two: Access Controls

March 07, 2012 Added by:Javvad Malik

Understand who’s trying to get access and choose the control that will really protect you. Or rather, I should say, the control should protect you long enough for you to do something about it. Otherwise you might find yourself as the person holding a knife in a gunfight...

Comments  (0)


What They Don't Teach You in "Thinking Like the Enemy" Classes

March 06, 2012 Added by:Pete Herzog

The enemy is not homogenous. Just like there is not just one foreign language, there is not one type of enemy. Among those enemy attackers, not all think alike. Even those joined together under a common mission or goal, there is often division in how to accomplish that goal...

Comments  (1)


Atlantic Security Conference 2012 Wrap Up

March 05, 2012 Added by:Darryl MacLeod

If you’re IT professional, and not necessarily one with a security focus, attending a conference like this would be well worth it. The threats discussed are very real and active. They will never go away, but that doesn’t mean the white hats should start waving white flags...

Comments  (0)


RSA Conference 2012 Wrap-Up

March 04, 2012 Added by:Robb Reck

RSA 2012 is in the books. The crypto-geniuses have gone home and are again working on solving our most challenging technical problems. The rest of us have returned home with some new insights and an improved plan for implementing security in our own little corners of the world...

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »