Blog Posts Tagged with "Information Security"
September 27, 2011 Added by:Infosec Island Admin
Hacker Halted offers more than 70 speakers and a very comprehensive agenda covering major hot topics surrounding information security across four dedicated tracks. Receive a free iPad and 2 nights accommodations when you sign up for selected training or a conference pass...
September 26, 2011 Added by:Dejan Kosutic
In Stage 1 audit (called Documentation review) the certification auditor checks whether your documentation is compliant with ISO 27001; in Stage 2 audit (also called Main audit) the auditor checks whether all your activities are compliant with both ISO 27001 and your documentation...
September 23, 2011 Added by:Ron Baklarz
I am anxious to follow the evolution of the EC Council's new C|CISO certification, as it looks as though it will fill some gaps missing from other "gold-standard" certifications, and that are necessary for one aspiring to be or currently practicing security at the C-level...
September 23, 2011 Added by:Headlines
“In the spirit of the Secretary General’s call for 'smart defense' through multinational efforts, the aim is to lower the cost of and facilitate national capability development. In the interconnected world of cyber space, we are only as strong as the weakest link...”
September 22, 2011 Added by:Scot Terban
There are too many ways that a company can open itself up to vulnerabilities. It takes a rounded approach to do the due diligence for that company’s security posture. The information security business has become a leviathan of competing entities from the quacks to the bleeding edge...
September 22, 2011 Added by:Jim Palazzolo
The goal of the conference was dissemination of information and giving individuals the ability to network with others in the field. What impressed me was the diverse pool of individuals at the conference. It was not uncommon to see someone sporting a purple mohawk, or pin stripe suit...
September 22, 2011 Added by:Headlines
The revised guidance has been expanded to include more information on a variety of risk factors essential to determining information security risk, such as threat sources and events, vulnerabilities and predisposing conditions, impact, and likelihood of threat occurrence...
September 22, 2011 Added by:Infosec Island Admin
Infosec Island will be conducting a series of video interviews with companies and vendors at the Hacker Halted conference in Miami, FL in late October. The interviews offer the opportunity for companies to highlight their knowledge of emerging trends in the information security field...
September 21, 2011 Added by:Jim Anderson
Infosec practitioners tend to look for "bright shiny objects" and focus on those as the centerpiece of their programs. Often, training is an afterthought and awareness is relegated to "lunch and learn" status. Ross does an excellent job of covering the benefits of a constructive security culture...
September 19, 2011 Added by:Danny Lieberman
As businesses become more and more interconnected, as cloud services percolate deeper and deeper into organizations, and as government compliance regulation becomes more complex and pervasive, the security “problem” becomes more difficult to solve and even harder to sell...
September 19, 2011 Added by:Joel Harding
There are literally tons of websites out there dealing with information warfare, information operations, psychological warfare, military information support operations and a myriad of topics. This website is not bad, not bad at all, it’s just not good....
September 19, 2011 Added by:Infosec Island Admin
We have lined up more than 70 speakers for this year's event, and designed a comprehensive agenda covering major topics in information security across 4 dedicated tracks. Receive a free iPad and 2 nights accommodations when you sign up for selected training or conference pass...
September 19, 2011 Added by:Craig S Wright
Writers have taken Gregory D. Evans, “author” of "World’s No. 1 Hacker" book to task for stealing vast blocks of other people’s work. Yet these people remain. Despite their frauds in passing off a level of expertise they do not actually possess, people trust these security doppelgangers...
September 19, 2011 Added by:Headlines
TomorrowNow, Inc., a non-operating subsidiary of SAP, today was sentenced to probation and ordered to pay a fine to the United States of $20 million for unauthorized access to computer servers belonging to Oracle Corporation (Oracle) and for willfully infringing copyrights held by Oracle...
September 16, 2011 Added by:Scot Terban
There will always be elements within the company with impetus to not take your advice on security matters and maybe even give you a large amount of pushback. This is especially true of any company that has little to no security posture to start with. So who are the key client players?
September 16, 2011 Added by:Security BSides
Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013