Items Tagged with "Security Awareness"


1789975b05c7c71e14278df690cabf26

5 Solid Ways to Build Security Culture in Your Organization (That You Probably Never Heard Of)

January 22, 2014 Added by:Pete Herzog

Teach employees not to say no. This and 4 other unconventional tricks will build or enhance your organization's security culture.

Comments  (2)

219bfe49c4e7e1a3760f307bfecb9954

How Do I Measure the Success of a Training Program?

November 19, 2013 Added by:Rohit Sethi

An information security training program is crucial for ensuring and maintaining a good security posture; in order to effectively manage this program you have to be able to measure it. This article introduces a concept recommended by NIST in their Special Publication 800-16, for evaluating training effectiveness.

Comments  (0)

Af2769c2480db78c589b811b428782b0

Bore Them With Death-by-Awareness: That’ll Teach em!

May 08, 2013 Added by:Lee Mangold

As security professionals, we have to understand that not everyone has a passion for security. In fact, most people don’t. Given that we know “they” don’t share our passion, and we know they are the most vulnerable attack vector, why do we continue to bore them with homogenous and irrelevant training?

Comments  (0)

32137b352537f11c1efe063869f00e0e

Security Awareness: To Train or Not to Train?

April 08, 2013 Added by:Le Grecs

It's up for each organization to monitor their threats and weaknesses and use the appropriate set of controls to minimize their risk to an acceptable level. Perhaps security awareness is part of that ... perhaps it is not.

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Security Resolutions for the New Year

December 28, 2012 Added by:Allan Pratt, MBA

As the New Year approaches, have you thought about your New Year’s resolutions? As a member of the information security industry, I would like to share five resolutions that you should definitely add to your list...

Comments  (0)

58bc13ef5da5ac4fc32d41c3fbc0e460

Closing the Vault Door

December 18, 2012 Added by:Suzanne Widup

For those of you who have appreciated The Leaking Vault series of data breach reports, I have some sad news. As I was days away from releasing the third installment, I received an email from Brian Martin with the Open Security Foundation stating that I do not have permission to use their data without a license...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

The INFOSEC Naughty List 2012: “The Twelve Charlatans of Christmas” Edition

December 12, 2012 Added by:Infosec Island Admin

But seriously folks, this post may be cathartic for me and a chuckle for you, but in reality it will change nothing. The douches will be douchey and the charlatans will sell their cyber snake oils. Enjoy the charlatanism and douchery...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

Reflected Glory: Revealing one of my self-created social engineering tricks

December 11, 2012 Added by:Will Tarkington

What is reflected glory? To do this trick you need someone with a high social status that you can be associated with. It doesn’t have to be a close association just one that is known. You then simply state with authority your own opinion once the relationship has been recently established...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

Lack of Security in Android Apps? That Could Be

December 02, 2012 Added by:Keith Mendoza

Have you ever installed an app in your Android phone and when you got to the permission screen you just couldn't justify to yourself why an app would require the permissions it's asking for?

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Convenience vs. Security - Why convenience keeps winning

November 26, 2012 Added by:Rafal Los

Convenience wins in the consumer mind, easily. Even in the mind of someone who's security-minded convenience may win out over a little added risk. This is especially true if the card issuers are willing to take on the risk at the anticipation of higher revenue or profit...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Makes My Passwords Vulnerable?

November 25, 2012 Added by:Robert Siciliano

Simple passwords: When 32 million passwords were exposed in a breach last year, almost 1% of victims were using 123456. The next most popular password was 12345. Other common choices are 111111, princess, qwerty, and abc123. Avoid these types of passwords, which are easily guessed...

Comments  (0)

888605c6c25c19e41bbbb986ea6d43c1

You Believe It Because "I" Wrote It

November 14, 2012 Added by:Jim Palazzolo

Besides sheer entertainment, my objective is to practice my ability to create deception. It has been my observation that security personnel must be able to spot deception. Whether it’s covert channels or fake ID’s, deception is a very powerful tool that can be used both offensively and defensive...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Privacy in Ubuntu 12.10: Full Disk Encryption

November 12, 2012 Added by:Electronic Frontier Foundation

Full Disk Encryption (FDE) is one of the best ways you can ensure all of the private information on your laptop stays private in case it's lost, seized, stolen, or if you choose to sell or give away your computer in the future. This feature has been built-in to many GNU/Linux distributions, including Ubuntu...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

Ubuntu Snafu: Privacy Is Hard, Let’s Go Shopping

November 10, 2012 Added by:Fergal Glynn

Amusingly, the plugin’s flood of attention means it is already racking up quite the bug count. For example, it does not currently do any NSFW prevention, and the results are returned in plaintext also. Have fun explaining that one to the ol’ boss-a-roni...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Website Security

November 08, 2012

So websites – even really large ones have some serious security flaws and it’s disturbing. Yet they don’t seem to care much. Guys like Troy Hunt are doing a great job bringing these issues to light. In this video Girl Cynic and I ponder over some of these issues...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Joining hands against cybercrime in Africa

November 08, 2012 Added by:Pierluigi Paganini

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »