Blog Posts Tagged with "Ben Rothke"
To the Cloud: Cloud Powering an Enterprise
March 10, 2012 Added by:Ben Rothke
Moving services to a public cloud means increasing your exposure to malicious attacks. This is not a potential increase, rather a definite increase. It is important to determine how well a cloud provider handles both technical and security requirements...
Comments (0)
Tangled Web: A Guide to Securing Modern Web Applications
February 26, 2012 Added by:Ben Rothke
There is no doubt that some sites use cookies as a mechanism for malicious use. But that there is nothing that makes it uniquely suited for this task, as there are many other equivalent ways to sore unique identifiers on visitor’s computes, such as cache-based tags...
Comments (0)
The Fundamentals of Infosec in Theory and Practice
February 14, 2012 Added by:Ben Rothke
Information security is an overwhelming body of knowledge, and for many it can indeed be a far too tremendous body of text to attempt to cover. To that effort this book is an invaluable resource as it covers the key areas without getting bogged down in the minutia...
Comments (0)
Metasploit: The Penetration Tester's Guide
January 30, 2012 Added by:Ben Rothke
The Metasploit Project is an open-source security project that provides information about security vulnerabilities and assists those performing the penetration tests in building a framework in which to carry out the testing...
Comments (1)
Plagiarism and the State of Infosec Publishing
August 16, 2011 Added by:Tony Campbell
Book publishers need to up their game in terms of their quality assurance processes in order to demonstrate their true worth to their customers, something that the charlatans, such as Gregory Evans and Ali Jahangiri, will always fail to deliver upon – since these guys are not publishers...
Comments (2)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps