Blog Posts Tagged with "Information Security"


Psychology of Information Security - The God Complex

January 27, 2012 Added by:Rafal Los

I'm willing to bet that if you went down the list of all the security policies that your organization has, there would be at least a few that you break based on the 'this doesn't apply to me, I know better' principle. This is also know in psychology as the "God Complex"...

Comments  (4)


The Myth of Defense in Depth

January 25, 2012 Added by:Rafal Los

There are two parts to the idea of defense in depth - there is the concept and the implementation. It's easy to talk about the concepts behind defense in depth - but to implement them effectively in today's technology landscape... well that is an entirely different cup of tea...

Comments  (5)


Clinton Unanimously Elected as Chair of the ITSCC

January 25, 2012 Added by:Marjorie Morgan

“Cyber attacks are becoming more serious and more sophisticated. Not only is our nation’s critical infrastructure, but virtually every private or government enterprise which relies on modern information technology is now being subjected to these increasingly advanced attacks..."

Comments  (0)


OTA: 2012 Data Protection and Breach Readiness Guide

January 24, 2012 Added by:Headlines

In 2011, over 558 incidents were reported at a cost to U.S. businesses of more than $6.5 billion dollars. It is estimated over 50% were a result of a server exploits; of which 96% were avoidable if the recommendations outlined in the OTA report had been implemented...

Comments  (0)


Roadmap to Exploitation: The OIG Imperative to Publish or Perish

January 23, 2012 Added by:

The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?

Comments  (9)


Can You Explain Encryption to Me?

January 23, 2012 Added by:Javvad Malik

I assumed that senior technology managers would have half a clue about technology. I have thought long and hard about this and think the easiest way to explain this would be to replace the word encryption with witchcraft. It too is misunderstood by the masses...

Comments  (4)


IC3: Recovery from the Malicious Erasure of Files

January 23, 2012 Added by:Headlines

Cyber criminals can damage a victim's computer by changing or deleting files, wiping hard drives, or erasing backups to hide some or all of their malicious activity and tradecraft. The FBI and DHS encourage businesses and individuals to employ these mitigation strategies...

Comments  (0)


Social Engineering Toolkit – User Agent Switcher –

January 21, 2012 Added by:Kyle Young

What if I want to clone a website that is the mobile version? What if I want to clone a website that checks to see if end users are Microsoft Windows users? This is where the Social Engineering Toolkit User Agent Switcher ( is applicable...

Comments  (0)


The Proliferation of Cyber Janitors

January 20, 2012 Added by:

What we really need in this industry is a complete shake up. We need true innovative thought that uses cyber intelligence, counterintelligence and active defense and offensive measures in our programs. No more sitting around waiting for the penetration...

Comments  (3)


Significance of 'Death of the Document Web' to Security

January 18, 2012 Added by:Rafal Los

Infosec pros just started getting comfy with profiling, analyzing, and defending web-based apps from a server, consumed by a human, and used in a browser. Hang on tight because the world just took a sharp left and if you're not buckled in you're bound to be thrown from the bus...

Comments  (2)


On Defending Networks

January 13, 2012 Added by:Gabriel Bassett

If we can secure areas of the world existing in at least 3 domains (land, air, and space) if not four (adding sea), then we should easily be able to train to defend networks existing in a single domain (digital)...

Comments  (0)


Participate in the Infosec Career Attitudes Survey

January 11, 2012 Added by:Jack Daniel

This specific survey was selected because it is a standard measurement recognized by folks who study such things; this means aggregated results can be used for comparison with other professions (where there is survey data available) and averages...

Comments  (0)


The Wheels of Justice Turn Slowly - But Exceedingly Fine

January 09, 2012 Added by:Infosec Island Admin

LIGATT (a.k.a. Greg Evans) is about to find out that once again the US government has said: “Hey, whatever happened to all that money he owes us?” Well that day has come and I do hope the government, being in such dire straights, comes after our little charlatan with both barrels...

Comments  (1)


Security BSides London 2012: Call for Papers

January 09, 2012 Added by:Security BSides

We’re looking for speakers for B-Sides London 2012. Once the deadline is reached the CFP will be closed and submissions will be peer reviewed. The process will be complete on February 20th. Selected talks will be slotted into streams and published on the B-Sides London website...

Comments  (0)


How to Re-Awaken Your Inner Hacker

January 04, 2012 Added by:Rafal Los

Information security cannot be a population of sheep, zombies or whatever other metaphor we want to use - we must be the most innovative thinkers, the ones who truly do think different and always question everything. With that in mind - here are some things I recommend...

Comments  (1)


IT Trends for 2011 and Beyond

December 25, 2011 Added by:Bill Gerneglia

CIOs and senior IT business decision makers must maintain a focus on specific trends that will effect the industries in which they compete. You should already be thinking about how technology is going to help shape your business far into the future. CIOs have to be forward-thinking...

Comments  (0)

Page « < 17 - 18 - 19 - 20 - 21 > »