Blog Posts Tagged with "Security Management"


Hacking Layer 8 - Wetware

July 22, 2010 Added by:Ron Baklarz

One can certainly see this train wreck coming with the potential for company names to be plastered all over the Internet with the embarrassing results of their social engineering-induced data leakage...

Comments  (1)


We Need Smarter Security - Not Pricier Security

July 19, 2010 Added by:Global Knowledge

Spending more on security does not always equate to better security. There are plenty of options for companies to consider in order to increase security without spending a fortune...

Comments  (0)


Open Betas for IPD Guides Available for Download

July 18, 2010 Added by:Jay Ferron

The Infrastructure Planning and Design guide for Microsoft Forefront Identity Manager (FIM) 2010 provides actionable guidance for designing a FIM 2010 infrastructure...

Comments  (1)


Configuring Security in Glassfish v3

July 17, 2010 Added by:Joe Morrissey

Configuring a security realm in Glassfish v3 to tie in with your pre-existing MySQL database for user credentials is actually easier than you might think...

Comments  (0)


How To Test for DNS Compatibility

July 16, 2010 Added by:Simon Heron

L.ROOT-SERVERS.NET was the first to switch to a signed copy of the root zone and can be used for testing. This version has been configured deliberately so that it cannot be validated. Its purpose is to allow operators to test whether they can receive signed responses cleanly...

Comments  (0)


Information Security or IT Security?

July 15, 2010 Added by:Dejan Kosutic

The basic point is this - you might have perfect IT security measures, but only one malicious act done by the administrator can bring the whole IT system down. This risk has nothing to do with computers, it has to do with people, processes, supervision, etc...

Comments  (10)


Name Servers and DNS Infrastructure

July 15, 2010 Added by:Nathaniel Markowitz

The NS naming structure provides an important insight into how criminal operations attempt to avoid down-time and service interruption. Due to the dubious nature of their activities, such organizations create a redundant infrastructure in order to support their activities...

Comments  (0)


Exploring the CFO's Role in Information Security

July 14, 2010 Added by:Rahul Neel Mani

Whenever there is a crunch, CFOs look at their biggest expenses, and they cut costs. What are the expenses that appear noncore? Advertising, brand building and IT? In reality, IT is actually the function that can help you save across the board...

Comments  (0)


MTA - Microsoft Technology Associate

July 14, 2010 Added by:Jay Ferron

The MTA will offer students a certification in the fundamentals of IT and development. Unlike more advanced Microsoft certifications, the MTA targets students with no prior IT or development experience or employment...

Comments  (0)


Splunk 4 Users Review

July 12, 2010 Added by:Brent Huston

Splunk is a log collection engine at heart, but it’s really more than that. Think of it as search engine for your IT infrastructure. It will actually collect and index anything you can throw at it, and this is what made me want to explore it...

Comments  (1)


Internet Security Alliance Briefs White House

July 12, 2010 Added by:Marjorie Morgan

ISA was a major participator in the development of the "Cyber Space Policy Review." The very first source cited in the Review is the ISA Social Contract for Cyber Security and the Executive Summary both begins and ends by citing the ISA...

Comments  (0)


CISOs Unable to Quantify Security Controls

July 12, 2010 Added by:Joe Morrissey

The irony is that whilst firms focus on preventing data spills, malicious theft is where the money is. Data security incidents related to accidental losses are unfortunately common, but by comparison with malicious theft, cause little quantifiable direct damage...

Comments  (2)


Dr. InfoSec's Quotes of the Week (003)

July 11, 2010 Added by:Christophe Veltsos

Who said: "The biggest vulnerability we face today and the future is not the thing that the technical security person would think of, like a botnet or technical flaw, but the misperception of risk..."?

Comments  (0)


WhatsUp Gold Engineer's Toolkit

July 09, 2010 Added by:Jay Ferron

As a security profession I am always on the lookout for tools that we help me do easier. Ipswich has just offered a free tool that should be in any Windows administrator took kit...

Comments  (0)


Using Information Rights Management to Prevent Snooping by IT Staff

July 09, 2010 Added by:Peter Abatan

In a recent news article a survey carried out by Cyber-Ark global survey claimed that 41% of IT pros admit to snooping on confidential information. Forty-one percent of respondents confessed to abusing administrative passwords to snoop on sensitive or confidential information...

Comments  (5)


Analysis on Defense and Cyber Warfare

July 08, 2010 Added by:Theresa Payton

Cyber war is not limited necessarily just between countries, as Google found out earlier this year. Countries have the ability to attack private companies, which could cause power outages, massive financial theft, or the loss of private information of millions of people...

Comments  (5)

Page « < 1 - 2 - 3 - 4 - 5 > »