Blog Posts Tagged with "SANS"

53692ae1a8e713373b8a487ce89ee3e2

Top 5 Things Learned at the SANS Mobile Device Security Summit

March 19, 2012 Added by:Tom Eston

Having a lineup of great speakers really made the summit flow as well as it did. What I liked most about this event was that there were plenty of “real world” talks on how enterprises are setting up and managing mobile deployments…real “in the trenches” types of talks...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

The SANS Report: The Jester: A Lesson in Asymmetric Warfare

March 05, 2012 Added by:Infosec Island Admin

Asymmetric Warfare Or Annoyance? Perhaps Jester has done things in the background we do not know about and he has not reported to the media, perhaps not. Overall though, the most creative thing he has done is to poison the LOIC. THIS was a real coup and I do appreciate that one...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Lilupophilupop SQLi Attack: One Million URLs Infected

January 05, 2012 Added by:Headlines

"When I first came upon the attack there were about 80 pages infected according to Google searches. Today, well as the title suggests we top a million, about 1,070,000 in fact - there will be duplicate URLs that show up in the searches. Still working on a discrete domain list for this..."

Comments  (1)

74db456e73657c300b53105c63db3b6f

The Urgent Need for Mobile Device Security Policies

November 20, 2011 Added by:Kevin Johnson

When gaps are uncovered in an environment, they must be augmented with new policies, as is the case with mobile devices. The need for businesses and government to establish strong policies for mobile environments and the protection of information used with mobile devices is immediate...

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

RIP - Cyber Security Expert Dr. Eugene Schultz

October 03, 2011 Added by:Ron Baklarz

Schultz authored/co-authored five books, wrote over 120 published papers and was also a certified SANS instructor, a senior SANS analyst, a member of the SANS NewsBites editorial board, and co-author of the 2005 and 2006 Certified Information Security Manager preparation materials...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Big Discounts on Infosec Training and Certifications

August 30, 2011 Added by:Infosec Island Admin

The ISLAND TRADEWINDS program is designed to offer infosec training and certification opportunities at significantly discounted rates. You can receive discounts of up to $500 or 20% on courses from Global Knowledge, Career Academy, SANS, and the Infosec Institute...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Tradewinds: Discounts on Infosec Training and Certification

July 31, 2011 Added by:Infosec Island Admin

The ISLAND TRADEWINDS program is designed to offer infosec training and certification opportunities at significantly discounted rates. You can receive discounts of up to $500 or 20% on courses from Global Knowledge, Career Academy, SANS, and the Infosec Institute...

Comments  (4)

Ebb72d4bfba370aecb29bc7519c9dac2

Complete PCI DSS Log Review Procedures Part 18 FINAL

March 22, 2011 Added by:Anton Chuvakin

For log exceptions copied from log aggregation tool or from the original log file, make sure that the entire log is copied, especially its time stamp, which is likely to be different from the time of this record, and the system from which it came from - what/when/where, etc...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

CyberForensics: Understanding Infosec Investigations

January 06, 2011 Added by:Ben Rothke

The book takes a broad look at cyberforensics with various case studies. Each of the books 10 chapters takes a different approach to the topic, and is meant to be a source guide to the core ideas on cyberforensics...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Don’t Share Passwords with Co-Workers

November 26, 2010 Added by:Dan Dieterle

Do not share your password with co-workers, or place your password in obvious places, like a sticky note on your monitor or under your keyboard. Also, lock your workstation before you walk away from it even if you think you will only be gone for a short while...

Comments  (5)

850c7a8a30fa40cf01a9db756b49155a

A Review of Real World Security Professional Certification

November 18, 2010 Added by:J. Oquendo

The RWSP is the one exam that separates the Pros from the Joes. Unlike conventional exams, there is no method for anyone to cram information for the sake of passing this exam. Unlike the OSCP, OSCE, CPT and CEPT exams, you will not only be put to the test, you will be frustrated...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Internet Kill Switch Debate Still Very Alive

November 17, 2010 Added by:Headlines

Regardless of the outcome of the proposed legislation, in the case of a national emergency, Internet access will be marginal at best, and business continuity plans that rely heavily on the notion that employees will be able to login to corporate networks from home are severely flawed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Java Still Presents Soft Target for Malware Threats

November 13, 2010 Added by:Headlines

The exploit is still being proliferated despite the fact that a patch to prevent the infection has been available since July, which is evidence that users have not been as proactive about securing Java as regularly as they update Windows patches...

Comments  (0)

09e5dbdf8a3bd6dccce5621459b11e26

Teaching Computer Forensics

August 24, 2010 Added by:Mark Bennett

In the government sector, cyber attacks on government agencies and contractors, originating from China, have proved difficult to suppress. Incident response and mitigation, class action lawsuits, and fines place remediation costs in the billions of dollars...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Feedback on SANS Top 7 Essential Log Reports

August 06, 2010 Added by:Anton Chuvakin

Thanks for overwhelming community response. The list has grown and is on the verge of becoming unwieldy, so I am about to close the comment period, write up the doc - any smokin’ hot log reports to add? Anything I should take OFF the list for not being top and essential?

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

SANS Essential Log Reports - Help Needed

July 15, 2010 Added by:Anton Chuvakin

Recently, I volunteered to create a 2010 version of SANS Top 5 Log Reports. With help from others and some research into past efforts, I have identified some report types and specific examples as candidates for a new Top 7 Essential Log Reports list – and now I need your help...

Comments  (7)

Page « < 1 - 2 > »