Items Tagged with "Infosec"


296634767383f056e82787fcb3b94864

Personal Reflections on Suits and Spooks DC 2013

February 13, 2013 Added by:Jeffrey Carr

Now that I've had a chance to decompress from and reflect upon the terrific Suits and Spooks DC conference last weekend, I want to share some surprising shifts in thinking that occurred for me during those two days.

Comments  (0)

37d5f81e2277051bc17116221040d51c

What’s on Your Phone? A Lot More than You Realize

January 31, 2013 Added by:Robert Siciliano

With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC. So if you have a smartphone or tablet, make sure you take steps to protect yourself...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Get Your Security BSides On In San Francisco

January 24, 2013 Added by:Security BSides

The goal of Security BSides is to expand the spectrum of conversation beyond the traditional confines of space and time. The conferences create opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration...

Comments  (1)

1b061b1cec6b5898e5326992d9461610

Cyberpunk and Music, Community Style

January 22, 2013 Added by:Dave Shackleford

Last year, I put out a call to the infosec community on Twitter for some new ideas on electronic music and Sci Fi books in the “cyberpunk” genre. Tons of you responded, and I wanted to capture this in a blog post to share the feedback...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Sure, I'll be Your Unicorn

January 21, 2013 Added by:Wendy Nather

I was fascinated to read about the last year cancellation of the British Ruby conference due to the arguments that the speaker lineup lacked diversity. Other people have their own opinions on why we have this problem and what we should do about it...

Comments  (0)

Bddcc5065237c686cb4d89dba8b276f2

Brand Statements Tell Your InfoSec Story

January 17, 2013 Added by:Steven Fox, CISSP, QSA

Listening to bad brand statements is like sitting through a bad movie or comedy skit. Yes, I am among those who stand politely as a vendor tries to sell me something without bothering to determine what I actually care about. At least I get to learn about bad brand stories...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Security Resolutions for the New Year

December 28, 2012 Added by:Allan Pratt, MBA

As the New Year approaches, have you thought about your New Year’s resolutions? As a member of the information security industry, I would like to share five resolutions that you should definitely add to your list...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Obligatory 2013 Infosec Predictions Post

December 26, 2012 Added by:Simon Moffatt

Technology evolves so quickly that 12 weeks is an age when it comes to new ideas and market changes - and security is no different. However, the main areas I will personally be following with interest though, will be the BYOD/BYOA, personnel, preemptive security and social intelligence...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The INFOSEC Naughty List 2012: “The Twelve Charlatans of Christmas” Edition

December 12, 2012 Added by:Infosec Island Admin

But seriously folks, this post may be cathartic for me and a chuckle for you, but in reality it will change nothing. The douches will be douchey and the charlatans will sell their cyber snake oils. Enjoy the charlatanism and douchery...

Comments  (0)

Bddcc5065237c686cb4d89dba8b276f2

Organizational Influence via Security Team Branding

December 09, 2012 Added by:Steven Fox, CISSP, QSA

Hacker Halted 2012 was full of personalities; executives, technologists, students and security enthusiasts – each one with stories that fueled conversations and debate. Technical and business erudition dominated the speaker sessions and the hacking competitions...

Comments  (0)

8e6e3972318ff74b194801340248199e

Security Job Titles

December 04, 2012 Added by:Scott Thomas

You may be listed as the 'Security Guru' in a large company but if all you're doing is making sure everyone is swiping their ID badge as they walk in, it may not be the job for you...

Comments  (0)

Ff632049ba1218ecd55b8122b2112642

Risky Business

December 03, 2012 Added by:Randall Frietzsche

In the broad spectrum of activities which might be called Information Security, we must always first and foremost implement, execute and follow through with risk management. Risk management is the backbone or foundation of any good information security program...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Preventative -v- Detective Security

December 02, 2012 Added by:Simon Moffatt

Security has several issues from a proactive implementation perspective. Like anything, a detailed return on investment, including both tangible and non-tangible benefits, is required...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Wargames on a New Level - Hackfest.CA in Quebec City

December 02, 2012 Added by:Rafal Los

When I was asked to come out to Quebec for a conference called Hackfest.CA, I was interested because this isn't a conference I had heard of, and it wasn't on my radar. Additionally, the name suggests it's geared towards the 'hackers' and quite frankly, I'm fairly out of practice...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Fifteen Tips to Improve Your Infosec Risk Management Practice

November 29, 2012 Added by:Tripwire Inc

For years security vendors have been able to play off the general fears of malware and cyber attacks. As the scope of protecting data has become more complex, we’ve slowly learned that deploying more security controls alone is not a risk management solution...

Comments  (0)

85e4e9d32348a15d6995085986881f2b

BSidesJackson 2012: A Brand Spanking New Infosec Community

November 27, 2012 Added by:Chris Sistrunk

BSidesJackson was the 1st infosec conference to be held in Mississippi. I organized BSidesJackson because I believe in infosec, and I also believe that having a local infosec community is essential...no matter where you work or what type of information/networks you must protect...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »