November 02, 2011 Added by:Scot Terban
The snow storm in October made me once again ponder my own readiness with regard to how to handle infrastructure failures. These same events have shown me just how clueless all too many people are about how to survive when their infrastructure goes down for any extended period of time...
November 02, 2011 Added by:Headlines
“In our country, we always have this debate whether the government should take a stronger hand or whether market forces are enough. We've run out of time to have that conversation, at least on some level. We have to get something done..."
November 02, 2011 Added by:Rafal Los
From a CISO perspective, listen to the pitches the vendors give you... listen to the basis for the solutions you're being asked to spend money on. Lately it has been about 2 things: FUD primarily (that's Fear, Uncertainty, Doubt) and features secondarily. What's wrong with that?
November 02, 2011 Added by:Headlines
"I don't want to speak about it. I don't even want to think about it. But we are close, very close, to cyber terrorism. Perhaps already the criminals have sold their skills to the terrorists - and then... oh, God," said Kaspersky...
November 02, 2011 Added by:PCI Guru
This SIG is to be created to guide merchants and service providers in what should be the result of a proper risk assessment, not create another risk assessment methodology. While such an Information Supplement is an admirable ideal, you understand why this SIG is a losing proposition...
November 02, 2011 Added by:Infosec Island Admin
TakeDownCon has raised the bar and set the standards of what a true technical IT security conference is supposed to be. It aspires to be the ideal platform for information security professionals to congregate to learn, network and share their knowledge...
November 01, 2011 Added by:Joshua Lochner
Based on application flows and the importance placed on a web presence, the goal is to configure notification level alerts to be sent to the System Administrators for security related events from the three servers in the front-end web server cluster, and configure emergency alerts...
November 01, 2011 Added by:Gabriel Bassett
The internet is really not one contiguous environment. Instead, due to the nature of service contracts and peering agreements, it's a mesh of interconnected information systems. These information systems are already undergoing a balkanization as we speak...
November 01, 2011 Added by:Robert Siciliano
Not a week goes by when we don’t hear of another major breach affecting thousands or even millions of customer accounts. Criminal hackers are getting smarter and savvier all the time, and they often have better technology than the banks and retailers tasked with protecting your data...
November 01, 2011 Added by:Chris Clymer
In Infosec, we have a lot of Rambos. We’re used to being looked to for answers, and we’re also used to being in the minority. There will always be more users, more IT staf, more “natives” who do not speak our language and who do not have a strong understanding of information security...
November 01, 2011 Added by:Headlines
“The findings of this survey are somewhat alarming, given recent attacks like Nitro and Duqu that have targeted critical infrastructure providers,” said Dean Turner, director, Global Intelligence Network for Symantec...
October 31, 2011 Added by:Kanguru Solutions
Both Endpoint Security and the Remote Management of connectable devices are powerful applications all by themselves, individually, but if you strategically combine them, so much more is possible. It's another great way to keep your living, breathing, beast of a network secure...
October 31, 2011 Added by:Enno Rey
Recently Apple launched its new offering iCloud. At this point, most infosec people start to worry a little bit: The common cloud concept of centralized data storage on premise of a third party does not cope well with the usual control focused approach of most technical infosec guys...
October 31, 2011 Added by:Headlines
The Jester had alluded to the fact that he may have actually been physically present at the conference by apparently hiding an encrypted message in one of the conference rooms, tweeting "left a little something under the projector in Alhambra SCADA room. Tweet me a photo of what's there"...
October 30, 2011 Added by:Scot Terban
It would seem that Anonymous, Antisec, and LulzSec have already decided to take up the mantle of vigilante’s already. However, the targets have been, for the most part, varied parties that could be seen as hapless victims or as malefactors, it all depends on the point of view really...
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013
Starting to Clean Up the Mess from PCAnywher... Peggy Patterson on 06-18-2013