Security Training


Suits and Spooks DC 2015: The Agenda - Last Chance to Register

January 29, 2015 Added by:Mike Lennon

Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.

Comments  (2)


Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?

January 27, 2015 Added by:Anton Chuvakin

Now that I’ve taken a fair number of “security analytics” client inquiries (with wildly different meanings of the phase), I can share one emerging pattern: a lot of this newly-found “analytics love” is really old “SIEM hatred” in disguise.

Comments  (3)


Looking Logically at Legislation

January 27, 2015 Added by:Wendy Nather

There's a lot of fuss around the recent White House proposal to amend the Computer Fraud and Abuse Act, and some level-headed analysis of it. There's also a lot of defensive and emotional reaction to it ("ZOMG we're going to be illegal!").

Comments  (3)


End of Life

January 27, 2015 Added by:PCI Guru

This topic has started to come up again as we go through PA-DSS research on applications and find that the listings contain operating systems that are at or past end of life (EOL).

Comments  (4)


The State of Obama Cybercare

January 26, 2015 Added by:Tripwire Inc

Over the past few years, we have seen cybersecurity move from the realm of IT into the boardroom and now onto the political stage. The reason for this is clear—the resiliency, security and safety of the Internet is critical to our economy and the progress of our society as a whole. It is our future.

Comments  (2)


Bringing Metasploit Exploits to Life with PowerShell

January 26, 2015 Added by:Dan Dieterle

You have a remote shell to a Windows box in Metasploit, very cool, but what can you do?

Comments  (2)


Battlefield Mobile: Threats Targeting In-Motion Endpoints Climbed in 2014

January 22, 2015 Added by:Patrick Oliver Graf

Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?

Comments  (1)


Security Spending Wasted When Software Goes Unimplemented

January 21, 2015 Added by:Brian Prince

According to a new survey of 172 IT decision makers and influencers in both enterprises and small to midsized businesses, 28 percent of organizations are not getting the most bang for their buck when it comes to their security investments.

Comments  (3)


Cyber-Civic Responsibility

January 21, 2015 Added by:Brent Huston

The only thing that really has a chance of working is if we all start taking responsibility for our own share of the problem.

Comments  (4)


Social Engineering: How Dangerous is Your Lunch Break?

January 15, 2015 Added by:Tripwire Inc

If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.

Comments  (0)


Fear Hackers? First Invest in an IT Security Culture Change

January 14, 2015 Added by:Kevin L. Jackson

With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.

Comments  (1)


Security Analytics – Finally Emerging For Real?

January 13, 2015 Added by:Anton Chuvakin

Security analytics – a topic as exciting and as fuzzy as ever!

Comments  (2)


Operational Security - Home Rules

January 12, 2015 Added by:Neohapsis

What we tell those we advise in business also applies to friends and family; the time you spend preparing now may save you countless hours of worry and expense down the road.

Comments  (4)


Young IT Professionals, Cybercrime, Script Kiddies & CyberWarriors, OH MY!

January 12, 2015 Added by:Brent Huston

Recently I came across a couple of articles that both centered on the potential roles that young people entering into the IT Security field may face.

Comments  (2)


Should Companies Strike Back at Hackers?

January 08, 2015 Added by:Tripwire Inc

The question of whether it makes sense to attack your cyber attackers isn’t new—this has been a debate in the infosec community for quite a while. In my opinion, in most cases the answer is “No, companies shouldn’t attack back.”

Comments  (6)


Ex-Employees: All the Best, But Can We Have Our Personal Emails Back, Please?

January 07, 2015 Added by:Patrick Oliver Graf

It doesn’t matter if employees leave a company on unpleasant terms or quite amicably – it is absolutely essential that enterprises have solid, well-defined termination processes in place, and that they’re followed to the letter.

Comments  (3)

Page « < 8 - 9 - 10 - 11 - 12 > »