Security Training

F66c1a87a8db2cb584b4e06e93a84ce3

Unfolding ‘DOUBLE TWINS’ Deception Scheme

July 29, 2013 Added by:Mikko Jakonen

‘DOUBLE TWINS‘ is deception scheme combining modern world speed, easiness to run anonymous with Internet and difficulties with real corporate and personal identity verification. What makes it most interesting; it was ‘quick in – quick out’ – job, completed within 3 weeks from the start.

Comments  (0)

B44a73900ca3197c2d8f148e303b3faa

Contextual-Relevance: A New Paradigm for Information Security.

July 08, 2013 Added by:Brad Bemis

Introducing the term "Contextual-Relevance" into the security lexicon: For information security to function properly, it MUST take into account the unique organizational context that applies in any given situation. This fundamental concept is so crucial to the underlying fabric of a successful security program, that is pervades all aspects of the security function.

Comments  (1)

Ae27d21943468124221937d59167fff8

New Training Model for Advanced Persistent Threat Detection and Mitigation

June 28, 2013 Added by:Edwin Covert

Organizations face a new threat to their information systems and intellectual property: advanced persistent threats, or APT. In order to detect and mitigate these attacks, organizations must develop a cyber-security capability that allows them to defend themselves.

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

Speaking with the VP of Enterprise Security at Scotiabank

June 25, 2013 Added by:InfoSec Institute

Greg Thompson has his work cut out for him as Scotiabank’s highest level security professional. Thompson, vice president of enterprise security services at the Toronto, Ontario-based entity, oversees a team responsible for ensuring that hackers, cyber terrorists and hacktivists don’t get bragging rights at company’s expense.

Comments  (1)

8a958994958cdf24f0dc051edfe29462

Cyber Attacks the Reality, the Reason and the Resolution Part 3

June 24, 2013 Added by:Larry Karisny

Knowing the reality and reasons behind cyberattacks, it’s time to stop talking and start offering resolution to these serious problems. There is no "it won’t happen to me" anymore. We must immediately deploy prevention and detection technologies to our critical processes or frankly, we could lose it all.

Comments  (0)

5556cc7a08173e4db1ee0687e015df68

Irregardless, Begs the Question, and SSAE 16 Certified

June 04, 2013 Added by:Jon Long

"Irregardless" is not a word, and is not a substitute for irrespective or regardless. "Begging the question" is a logical fallacy, not a substitute for "...which raises the question...", and there is no such thing as an "SSAE 16 certification".

Comments  (0)

5c549756b3c0b3d5c743158a72ce3809

Do You Have a Vendor Security Check List? You Should!

May 09, 2013 Added by:Michael Fornal

A security check list is a list of security controls that a vendor or application must meet. These controls can range from how storage back up is to be done, to password complexity requirements. Having a checklist can help you in deciding if the application or vendor conforms to your company’s security requirements.

Comments  (0)

Af2769c2480db78c589b811b428782b0

Bore Them With Death-by-Awareness: That’ll Teach em!

May 08, 2013 Added by:Lee Mangold

As security professionals, we have to understand that not everyone has a passion for security. In fact, most people don’t. Given that we know “they” don’t share our passion, and we know they are the most vulnerable attack vector, why do we continue to bore them with homogenous and irrelevant training?

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

On Dutch Banking Woes and DDoS Attacks

April 25, 2013 Added by:Don Eijndhoven

If you don't live in the Netherlands or don't happen to have a Dutch bank account, you can certainly be forgiven for not having caught wind of the major banking woes that have been plaguing the Dutch.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Enter the CISO: Torchbearer of Security and Risk Management

April 06, 2013 Added by:Anthony M. Freed

In a convergence culture, accountability for risk is accepted across the organization, and when that happens, risk management becomes a priority to the business, informing strategy and objectives. By helping identify and mitigate risk across finance, operations and IT, the CISO puts security in context of what could affect profit.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Defending the Corporate Domain: Strategy and Tactics

March 27, 2013 Added by:Rafal Los

Strategy without accompanying tactics is a lost cause. Tactics without a solid footing in strategy is an expensive lost cause. The maturity of an organization's security team is directly proportional to their ability to have a foundational strategy and be able to implement tactical measures and feedback to adjust to changing conditions in order to defend adequately.

Comments  (0)

942a200514c2a9d79858ce6355c40614

The Five-Step Privilege Management Checklist for Financial Organizations

March 27, 2013 Added by:Paul Kenyon

Financial institutions sit at the top end of the scale for security and reputational risk, with their databases of customer information making them especially vulnerable to criminal interception and subject to regulatory obligations.

Comments  (0)

1de705dde1cf97450678321cd77853d9

Hardening Is Hard If You're Doing It Right

March 20, 2013 Added by:Ian Tibble

The early days of deciding what to do with the risk will be slow and difficult and there might even be some feisty exchanges, but eventually, addressing the risk becomes a mature, documented process that almost melts into the background hum of the machinery of a business.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Ben Rothke on the Five Habits of Highly Secure Organizations

March 18, 2013 Added by:Tripwire Inc

There are five habits of highly secure organizations, said Ben Rothke (@benrothke), Manager – Corporate Services Information Security at Wyndham Worldwide.

Comments  (1)

Da3ca2c61c4790bcbd81ebf28318d10a

So APT Is China *snicker* Now What?

February 28, 2013 Added by:Krypt3ia

As RSA comes to a close and the corridors of the hall stop ringing with the acronym APT, I find myself once again looking at the problem as opposed to the hype.

Comments  (0)

306708aaf995cf6a77d3083885b60907

China's PLA Behind Massive Cyber Espionage Operation

February 19, 2013 Added by:Mike Lennon

In a fascinating, unprecedented, and statistics-packed report, security firm Mandiant made direct allegations and exposed a multi-year, massive cyber espionage campaign that they say with confidence is the work of China.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked