Items Tagged with "Information Security"


94ae16c30d35ee7345f3235dfb11113c

How Best to Discuss a Whole of Nation Approach to Information Activities

November 12, 2012 Added by:Joel Harding

Now that IO has a new definition, there is no longer a clear cut way to divide up the parts. My friend and mentor, Dr. Dan Kuehl, invented a model I like to use, called the Three C model. ‘What we do’ can be divided into Connectivity, Content and Cognitive...

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Industrial Control System Security: A Reliability Issue?

November 06, 2012 Added by:Larry Karisny

Cyber Security Expert Joe Weiss has spearheaded the ICS Cyber Security Conference for 12 years and when he calls in the troops, the best come to serve. Last month’s conference held at Old Dominion University's Virginia Modeling Analysis and Simulation Center -- VMASC in Suffolk, Va. -- was no different...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Rethinking the consumer/enterprise operating system

October 28, 2012 Added by:Rafal Los

When Microsoft converged their kernel and made a single version of Windows most people were relieved, especially Microsoft developers and security types. It was now going to be easier to maintain the code base - but was that the right call? I think the jury may still be out...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Impressive Speaker Lineup Announced for TECHEXPO Cyber Security Event

October 23, 2012 Added by:Infosec Island Admin

"Our team is extremely pleased with the high caliber, diversity and expertise of the confirmed speakers we have secured for this event. Having such a dynamic lineup of highly respected industry professionals to share their knowledge and inspire those seeking employment..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The subtle difference between metrics and insight

October 18, 2012 Added by:Rafal Los

The audience matters when you're collecting data and trying to make sense of it. In fact, the audience matters so much that sometimes you can't even 'refine' your way from one tier to another without going out and collecting a whole new set of data..

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Favorite Security Tools

October 17, 2012 Added by:Brent Huston

Wireshark – Sharking the wires is one of my favorite things to do. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need...

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

What’s Your Horizon of Focus for Security?

October 09, 2012 Added by:Tripwire Inc

In the corporate world, we talk a lot about corporate goals & objectives. In the US Government, you hear a lot about “The Mission,” which is the unifying goal that ties an agency (or multiple agencies) together in a shared sense of purpose. I’m a big believer in connecting our actions as information security professionals to The Mission...

Comments  (0)

5b4dab10939f37f8bee4017c584353fe

GrrCON: The Family Infosec Con

October 02, 2012 Added by:Philip Polstra

As always happens in a multi-track con, I was unable to attend every talk, so don't take offense if you spoke and your talk isn't listed here. I received many good reports from my students who attended different talks. None of my students complained about any bad talks...

Comments  (2)

Bd07d58f0d31d48d3764821d109bf165

Five Tips for CISOs Presenting to the Board

October 01, 2012 Added by:Tripwire Inc

As security is becoming more important in the overall risk posture of organizations, boards are becoming more interested hearing directly from security executives which requires a different level of communication that CISO/CSOs may not be used to presenting...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

On the Lack of IT Readiness: The Security Edition

September 30, 2012 Added by:Rafal Los

Sticking to the basics wouldn't be such a bad thing in Security... if we had a clue on how to do the basics right. I know plenty of people who pentest all day every day and they'll be the first to tell you how easy it is to break in because defenses are so weak, if they exist at all...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

On Security Conference Mania

September 30, 2012 Added by:Fergal Glynn

From giant industry events, analyst events, regional events, hacker cons, to any kind of gathering you can think of including conferences on boats, trains, and buses. At any given time, you can find a security conference happening. What is it about the industry that loves an event?

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Pre-Rejected CFP Submissions

September 27, 2012 Added by:Wendy Nather

A disturbing trend in security conferences is meta-talks that have nothing to do with pwning stuff. Burnout, sexism, career advice, economics, recruiting, food, exercise and other presentations on what's wrong with the security industry, are replacing actual knowledge transfer...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Metaphorically Speaking...

September 24, 2012 Added by:Tripwire Inc

Security people tend to be engineering oriented and suffer in the communication department. There’s an implied link that security might get broader adoption if security communication had more resonance with non-security people. Enter the popular use of the metaphor as meme...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Hacking Exposed 7: Network Security Secrets and Solutions

September 23, 2012 Added by:Ben Rothke

With the release of Hacking Exposed 7: Network Security Secrets & Solutions, authors Stuart McClure, Joel Scambray and George Kurtz (along with over 10 contributing authors) provide an up to date version to the original classic. The book includes the essentials of hacking...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask the Experts: Management and Rational Decisions About Security

September 22, 2012 Added by:Brent Huston

Emphasize that there are security measures that are effective in zero day situations. These include such controls as anomaly based detection mechanisms, system user security training, and incident response programs. If you can detect these attacks early and respond to them correctly...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

How to Become an Infosec Rock Star

September 20, 2012

I teamed up with the infamous Space Rogue to finally reveal the secrets "they" didn't want you to know - that's right, we break down how you can become an Infosec Rockstar...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »