Blog Posts Tagged with "Information Security"
August 23, 2012 Added by:Infosec Island Admin
Ok, so after a flurry of tweets about the candidacy of others, my name got thrown in there like so much pasta being chucked at a wall. Well, it stuck in my case and I decided to run. So, if you think that I can get in there and stir up some trouble, and maybe make some changes then VOTE FOR ME in this petition...
August 22, 2012 Added by:Randall Frietzsche
So what is an Infosec professional? Like the Samurai we're really warriors, we're soldiers in a battle of good vs. not-so-good. We craft our skills, we increase our knowledge, we strive to be better than those who might do our Enterprises harm, breach our castle walls and loot our treasures of data and services...
August 22, 2012 Added by:Infosec Island Admin
Dave Lewis wants to work to restore the CISSP exam and it’s place in the community as something to be respected, help bring the ISC2 into the wider acceptance, help make it a force for positive change, and ensure that the ISC2 is representative and accountable to it’s membership...
August 20, 2012 Added by:Rafal Los
In far too many organizations leaders and practitioners tell me that the role of Information Security is to protect the organization. Accepting this thinking got us into the predicament where are today, where security isn't everyone's job and only Infosec is thinking about security. This couldn't be more wrong...
August 16, 2012 Added by:Security BSides
It’s time to revive this tradition and bring it to the modern day security conference. From an open call to the world, twelve teams representing hackerspaces and maker groups will be selected to come to Las Vegas to compete in four categories in front of a panel of judges to demonstrate what they have accomplished...
August 14, 2012 Added by:Javvad Malik
To honour the new found love-affair the media has with security, I predict Hollywood will jump on the Secploitation bandwagon, so I’ve done the hard work and come up with some sample titles. If you’re a producer or director and need scripts, get your people to give my people a call. We can work something out...
August 13, 2012 Added by:Ben Rothke
Amazon is a prime feeding ground for the virtual-plagiarist given that Amazon makes a profit off everything sold, and they have no incentive to stop such practices as it would affect their profitability. Amazon takes a kid-gloves approach to plagiarism. That is all the more true for virtual-plagiarized text...
August 12, 2012 Added by:Robb Reck
What makes an organization effective is in knowing what their customer-base needs or wants. We are only as valuable as the service we give to our customers. For many of us, our primary customers are internal. The business leaders, the IT department, our vendors, and many others are the customers who are served...
August 12, 2012 Added by:Scott Thomas
Part of the infosec profession is staying abreast of news and events. You need to know what attacks are going on in order to know how to defend against them. The problem with this is that it consumes all your free time. What you start to realize though, is you become addicted to information overload...
August 09, 2012 Added by:Kelly Colgan
We can’t sugarcoat it, because there’s more at stake for online users than going for gold or settling for silver. One blip on the beam or pratfall on the pommel can make a bank-account balance drop faster than an icy judge’s score. And it’ll take more than a Wheaties box to build it back...
August 08, 2012 Added by:Tripwire Inc
The hardest part about security is...? Security BSides Las Vegas attendees finished the sentence, and Infosec Island‘s Anthony M. Freed caught them on camera. The responses range from insightful to geeky, depressing to funny, and some are harsh, some others pragmatic, but all are quite sage...
August 03, 2012 Added by:Tripwire Inc
The sessions felt somewhat lack-luster – a lot of what I was hearing had been said before. Many of the conversations were consistent with other events and the topics felt replayed. The horrifically long coffee queue at Starbucks provided me with time to people watch, so here are my Black Hat 2012 observations...
August 02, 2012 Added by:Bill Mathews
General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?
August 01, 2012 Added by:Robert Siciliano
By hacking your device, you can potentially open security holes that may have not been readily apparent, or undermine the device’s built-in security measures. Jailbroken and rooted phones are much more susceptible to viruses and malware...
August 01, 2012 Added by:Boris Sverdlik
The upside for being in Vegas for BlackHat is that BSidesLV runs concurrently. BSides always tend to be much better events. The attendees are rarely the vendor mouthpiece types and this alone makes the conference enjoyable. I had attended more talks at BSides than I have at other conferences combined this year....
July 31, 2012 Added by:Dan Klinedinst
I just got home from the "Vegas week" of Black Hat, BSidesLV, and DefCon. I love many things about each, and each has things I wish they'd do better. This is true of all the conferences I've attended. However, a few questions are lingering in my mind after Vegas, possibly due to the effects of sleep deprivation...
Cyphort Detects Surge in Ad Network Infectio... smith alexander on 07-30-2014
"Fake ID" Android Vulnerability in Lets Mali... smith alexander on 07-30-2014
Multipath TCP - Black Hat Briefings Teaser ... smith alexander on 07-30-2014