Blog Posts Tagged with "Information Security"
January 25, 2012 Added by:Marjorie Morgan
“Cyber attacks are becoming more serious and more sophisticated. Not only is our nation’s critical infrastructure, but virtually every private or government enterprise which relies on modern information technology is now being subjected to these increasingly advanced attacks..."
January 24, 2012 Added by:Headlines
In 2011, over 558 incidents were reported at a cost to U.S. businesses of more than $6.5 billion dollars. It is estimated over 50% were a result of a server exploits; of which 96% were avoidable if the recommendations outlined in the OTA report had been implemented...
The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?
January 23, 2012 Added by:Javvad Malik
I assumed that senior technology managers would have half a clue about technology. I have thought long and hard about this and think the easiest way to explain this would be to replace the word encryption with witchcraft. It too is misunderstood by the masses...
January 23, 2012 Added by:Headlines
Cyber criminals can damage a victim's computer by changing or deleting files, wiping hard drives, or erasing backups to hide some or all of their malicious activity and tradecraft. The FBI and DHS encourage businesses and individuals to employ these mitigation strategies...
January 21, 2012 Added by:Kyle Young
What if I want to clone a website that is the mobile version? What if I want to clone a website that checks to see if end users are Microsoft Windows users? This is where the Social Engineering Toolkit User Agent Switcher (setuas.sh) is applicable...
What we really need in this industry is a complete shake up. We need true innovative thought that uses cyber intelligence, counterintelligence and active defense and offensive measures in our programs. No more sitting around waiting for the penetration...
January 18, 2012 Added by:Rafal Los
Infosec pros just started getting comfy with profiling, analyzing, and defending web-based apps from a server, consumed by a human, and used in a browser. Hang on tight because the world just took a sharp left and if you're not buckled in you're bound to be thrown from the bus...
January 11, 2012 Added by:Jack Daniel
This specific survey was selected because it is a standard measurement recognized by folks who study such things; this means aggregated results can be used for comparison with other professions (where there is survey data available) and averages...
January 09, 2012 Added by:Infosec Island Admin
LIGATT (a.k.a. Greg Evans) is about to find out that once again the US government has said: “Hey, whatever happened to all that money he owes us?” Well that day has come and I do hope the government, being in such dire straights, comes after our little charlatan with both barrels...
January 09, 2012 Added by:Security BSides
We’re looking for speakers for B-Sides London 2012. Once the deadline is reached the CFP will be closed and submissions will be peer reviewed. The process will be complete on February 20th. Selected talks will be slotted into streams and published on the B-Sides London website...
January 04, 2012 Added by:Rafal Los
Information security cannot be a population of sheep, zombies or whatever other metaphor we want to use - we must be the most innovative thinkers, the ones who truly do think different and always question everything. With that in mind - here are some things I recommend...
December 25, 2011 Added by:Bill Gerneglia
CIOs and senior IT business decision makers must maintain a focus on specific trends that will effect the industries in which they compete. You should already be thinking about how technology is going to help shape your business far into the future. CIOs have to be forward-thinking...
December 24, 2011 Added by:Jim Palazzolo
When we truly understand that every server we secure, policy enforced, card swipe device locked down, banking website code scrubbed, and public facing connection port blockaded has a human being at the end we will then fully grasp the concept of "defense-in-depth"...
December 20, 2011 Added by:Dan Dieterle
This is a great tool to see patterns in password security. After years of users being warned about password security, it is disheartening to see the majority of users are still using simple passwords. More alarming is the number of password dumps available from compromised websites...
A Fresh Approach to Building an Application ... james russa on 09-22-2014
3 Things To Consider When Revisiting Your Ba... james russa on 09-22-2014
Security and Today’s Managed Service Provi... james russa on 09-22-2014