Items Tagged with "Security"


Vote for Boris Sverdlik aka JadedSecurity for ISC2 Board

August 23, 2012 Added by:Boris Sverdlik

I’m not going to promise things that I may or may not be able to deliver on, but I can promise I will stick to what I believe is a shared vision in the community for a value add certifying body. In order to change perception of the certification and the certifying body we need to change...

Comments  (0)


Scot Terban ISC2 Board Candidacy

August 23, 2012 Added by:Infosec Island Admin

Ok, so after a flurry of tweets about the candidacy of others, my name got thrown in there like so much pasta being chucked at a wall. Well, it stuck in my case and I decided to run. So, if you think that I can get in there and stir up some trouble, and maybe make some changes then VOTE FOR ME in this petition...

Comments  (0)


Infosec: Be All You Can Be

August 22, 2012 Added by:Randall Frietzsche

So what is an Infosec professional? Like the Samurai we're really warriors, we're soldiers in a battle of good vs. not-so-good. We craft our skills, we increase our knowledge, we strive to be better than those who might do our Enterprises harm, breach our castle walls and loot our treasures of data and services...

Comments  (7)


Security BSides is Coming Memphis

August 22, 2012 Added by:Security BSides

The goal of Security BSides is to expand the conversation beyond the traditional confines. BSides creates opportunities to both present and participate in an atmosphere that encourages collaboration. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)


Vegas, BlackHat, BSidesLV and DefCon: The Video

August 02, 2012

Javvad takes us on a whirlwind video tour of Vegas, BlackHat, BSidesLV and DefCon. You will see a lot of familiar faces in characteristically compromising situations. Remember, if you can't keep it in Vegas, try to only share the small details...

Comments  (0)


Medical Device Security: This Time It’s Personal

June 22, 2012 Added by:shawn merdinger

The work done by security researchers on their own devices is only the beginning of what we can expect will be a deluge of medical device related vulnerabilities, and it’s worthwhile to explore some of the reasons as to why the current situation is the way it is now...

Comments  (0)


Companies Focus on Growth But Lag Behind Threats

June 20, 2012 Added by:Bob Radvanovsky

Industries that are regulated or that have to adhere to a standard feel that if they simply follow the requirements that they are secured. This is a misnomer, as adherence to a regulation, governance or compliance standard is a good start, but it does not necessarily mean that an organization is "secure"...

Comments  (0)


Lies, Damn Lies, and Infosec

June 13, 2012 Added by:Dave Shackleford

I often hear infosec folks opine that things are futile, we’re not making a lot of progress, we’re not “winning” (whatever that means). I’ve struggled with this for a long time. I’m an optimist and I want badly to believe that we can succeed at beating back what for all appearances seems to be an unending tide...

Comments  (0)


LinkedIn Failed to Meet Standards or Better Standards are Needed

June 10, 2012 Added by:Jeffrey Carr

LinkedIn doesn't have a CSO or CISO, which for a publicly traded company communicates that security is not a priority. Considering they still don't know how this breach occurred and the minimal attention payed to password security, I can't help but wonder how secure the credit card information is...

Comments  (0)


Memorial Day – A Big Thank You

May 27, 2012 Added by:Thomas Fox

Today is Memorial Day, the day we celebrate the men and women who have served our country in our armed forces. I would ask each of you to honor our veterans, even if it is just a moment to reflect on those who made the ultimate sacrifice in giving their lives to protect the rest of us...

Comments  (0)


Is Security Broken? How I Propose to Fix It...

May 23, 2012 Added by:PCI Guru

In a true war, we would be investing in creating an offensive capability to go into cyber-battle with the enemy. And while there are discussions about having offensive capabilities, security professionals are still in a defensive posture protecting the organization...

Comments  (2)


Facebook "Like" Button = Privacy Violation + Security Risk

May 21, 2012 Added by:Matthijs R. Koot

If you walk into a store, would you appreciate it if the owner phoned a random stranger to tell them? Probably not. Yet every time I visit a website that has a Facebook `Like'-button, my browser discloses that visit to Facebook, despite the fact that I do not have a Facebook profile...

Comments  (3)


Consumer Banking Security Products and Services

May 10, 2012 Added by:Robert Siciliano

All the conveniences of digital banking have its set of risks which requires upgrades in card technologies and authentication. In response banks have provided numerous methods for protecting your personal information and also making your banking experience more secure...

Comments  (1)


Five Concerns Surrounding Pinterest

May 10, 2012 Added by:Allan Pratt, MBA

At the current time, there are no privacy or security settings similar to Facebook or Google Plus, and boards cannot be made private, similar to customized Facebook lists or customized Google Plus circles. The bottom line is that anyone with Internet access can view your boards...

Comments  (5)


Busting the Ten Biggest Computer Security Myths

May 08, 2012 Added by:Headlines

While some of the myths addressed may seem to be common sense issues, they also represent widespread misconceptions that continue to be pervasive in the information technology world today, so a reminder that these notions are bunk seems in order...

Comments  (1)


The Patchwork Cloud: Making the Security Case

May 05, 2012 Added by:Rafal Los

When we think about cloud computing we can think of security as getting a bit of a gentle push, or shove in some cases. The way it is built and billed as services instead of individual components, and the increased emphasis on automation - security has a real chance of not being a roadblock...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »