Blog Posts Tagged with "Infosec"

E313765e3bec84b2852c1c758f7244b6

Three Ways to Engage with the InfoSec Community

November 14, 2012 Added by:Brent Huston

Folks who are just coming into infosec often ask me for a few ways to engage with the infosec community and begin to build relationships. Here a few quick words of advice that I give them for making that happen. BUT, you have to work to earn respect and rapport in this community and contribute. You must add value...

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Infosec’s Most Dangerous Game: Groupthink

November 07, 2012 Added by:Dave Shackleford

These days, I am very, very afraid for the future of CISOs. Over the past few years, and specifically the past 12 months, I have become increasingly alarmed at the level of “groupthink” and “synchronized nodding” going on with security executives. Here are some of the things I am seeing...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Advice to New InfoSec Folks

November 07, 2012 Added by:Brent Huston

Question: “I really want to know what advice the Experts would give to someone looking to get into the information security business. What should they do to get up to speed and what should they do to participate in the infosec community?”...

Comments  (0)

C67c179cd59e50f867e06086f5b2d21f

The Security Reality of Road Warriors

October 28, 2012 Added by:Barrie Hadfield

Marketing and sales professionals will, inevitability, require a cloud-based collaboration processes or they face a potential competitive disadvantage. Therefore, IT executives are best-served by investigating the rate at which their employees are using unsanctioned tools that facilitate potential breaches...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Impressive Speaker Lineup Announced for TECHEXPO Cyber Security Event

October 23, 2012 Added by:Infosec Island Admin

"Our team is extremely pleased with the high caliber, diversity and expertise of the confirmed speakers we have secured for this event. Having such a dynamic lineup of highly respected industry professionals to share their knowledge and inspire those seeking employment..."

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

Steganography: Hiding In Plain Sight

October 18, 2012 Added by:Alan Woodward

I recently wrote a piece for the BBC in which I tried to explain why steganography (as opposed to cryptography) posed a threat. Or least it might. The trouble is we don't really know, and the default position has been to assume that because we haven't discovered it being used en masse the threat is negligible...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Favorite Security Tools

October 17, 2012 Added by:Brent Huston

Wireshark – Sharking the wires is one of my favorite things to do. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

The Cyber Money Train

October 15, 2012 Added by:Joel Harding

Anything to do with Cyber equates to a lot of money. One estimate for CY 2012 was $13 Billion being budgeted for cybersecurity just for the US government. One study I read predicted we would need to increase spending by up to 1,800 percent. That, ladies and gentlemen, is a big chunk of change...

Comments  (1)

A1f4c2dd4be7f118911ec4e0df35aab1

Believe It or Not, DevOps and Infosec Are a Perfect Culture Match

October 14, 2012 Added by:Gene Kim

By integrating automated security testing into the deployment pipeline, just as the functional and integration tests are, information security testing becomes part of the daily operations of Development. As a result, security defects are found and fixed more quickly than ever...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Popularizing the Lone (Security) Wolf

October 14, 2012 Added by:Tripwire Inc

It’s interesting to me that as a security industry (a subset of the larger computer industry), we talk at our conferences about how stress and burnout come from always being on the front line, feeling isolated, unable to relax; and we draw parallels to how strange our industry is in this way...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

I’m Mad as Hell about an Executive Order on Cybersecurity

October 07, 2012 Added by:Joel Harding

And as much as you might not care, if President Obama signs an Executive Order on cybersecurity, it will set the de facto standards that we all must live with. You’ll share the data and you’ll have to live with the standards...

Comments  (0)

5b4dab10939f37f8bee4017c584353fe

Don't Be a Con (Insert Favorite Term for Jerk Here)

October 07, 2012 Added by:Philip Polstra

While ours is a friendly community, I did observe my share of bad behavior from a small minority in our community. So here is my short list of ways you can avoid being a (jerk term) at a con. If we all were to follow even these 4 simple rules the infosec world would be a better place...

Comments  (0)

5b4dab10939f37f8bee4017c584353fe

GrrCON: The Family Infosec Con

October 02, 2012 Added by:Philip Polstra

As always happens in a multi-track con, I was unable to attend every talk, so don't take offense if you spoke and your talk isn't listed here. I received many good reports from my students who attended different talks. None of my students complained about any bad talks...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Cyberwar, Cyberdouchery, and Where the Rubber Meets the CyberRoad

October 01, 2012 Added by:Infosec Island Admin

The cyberwar is upon us and we had best start taking it seriously because people in power are making plans, and like biological warfare, it seems perhaps there could be unforeseen circumstances that could trigger bigger and worse things. Plan accordingly and think a bit more cogently...

Comments  (2)

68b48711426f3b082ab24e5746a66b36

On Security Conference Mania

September 30, 2012 Added by:Fergal Glynn

From giant industry events, analyst events, regional events, hacker cons, to any kind of gathering you can think of including conferences on boats, trains, and buses. At any given time, you can find a security conference happening. What is it about the industry that loves an event?

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Pre-Rejected CFP Submissions

September 27, 2012 Added by:Wendy Nather

A disturbing trend in security conferences is meta-talks that have nothing to do with pwning stuff. Burnout, sexism, career advice, economics, recruiting, food, exercise and other presentations on what's wrong with the security industry, are replacing actual knowledge transfer...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked