Items Tagged with "Infosec"


Israeli and Muslim Hackers Bring Knives to Gun Fight

January 19, 2012 Added by:Infosec Island Admin

There was the dropping of the SCADA passwords recently, and that is more along the lines of doing something. As I wrote recently about cyberwar, the real aegis is to damage infrastructure, supply chain failure, and in the end invade or conduct military operations...

Comments  (2)


How To Choose A Security Vendor

January 16, 2012 Added by:Brent Huston

Variations exist in depth, skill level, scope, reporting capability, experience, etc. Selecting security testing vendors based upon price is a bad idea. Matching specific experience, reporting styles and technical capabilities to your environment is a better solution...

Comments  (0)


On Defending Networks

January 13, 2012 Added by:Gabriel Bassett

If we can secure areas of the world existing in at least 3 domains (land, air, and space) if not four (adding sea), then we should easily be able to train to defend networks existing in a single domain (digital)...

Comments  (0)


Participate in the Infosec Career Attitudes Survey

January 11, 2012 Added by:Jack Daniel

This specific survey was selected because it is a standard measurement recognized by folks who study such things; this means aggregated results can be used for comparison with other professions (where there is survey data available) and averages...

Comments  (0)


Security BSides London 2012: Call for Papers

January 09, 2012 Added by:Security BSides

We’re looking for speakers for B-Sides London 2012. Once the deadline is reached the CFP will be closed and submissions will be peer reviewed. The process will be complete on February 20th. Selected talks will be slotted into streams and published on the B-Sides London website...

Comments  (0)


Malware Analysis: How to Decode JavaScript Obfuscation

January 05, 2012

When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation. What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?

Comments  (0)


How to Re-Awaken Your Inner Hacker

January 04, 2012 Added by:Rafal Los

Information security cannot be a population of sheep, zombies or whatever other metaphor we want to use - we must be the most innovative thinkers, the ones who truly do think different and always question everything. With that in mind - here are some things I recommend...

Comments  (1)


Secure Communications for CERTs and Stakeholders

December 29, 2011

ENISA seeks to identify the most suitable technology and platform to provide secure channels to improve communications with CERTs and other stakeholders. Secure transportation of information assures some combination of confidentiality, integrity and authenticity of the data...

Comments  (0)


Want Rapid Feedback? Try a Web Application Security Scan

December 27, 2011 Added by:Brent Huston

While this service finds a number of issues and potential holes, we caution against using it in place of a full application assessment or penetration test if the web application in question processes critical or highly sensitive information...

Comments  (0)


The Human Factor

December 24, 2011 Added by:Jim Palazzolo

When we truly understand that every server we secure, policy enforced, card swipe device locked down, banking website code scrubbed, and public facing connection port blockaded has a human being at the end we will then fully grasp the concept of "defense-in-depth"...

Comments  (0)


Enterprise Information Security Resolutions for 2012

December 18, 2011 Added by:Robb Reck

Successful information security is about making progress. It’s not reasonable or sustainable to expect all risks to be remediated as soon as they are discovered. Instead, my goal for 2012 will be to establish a positive trend, working toward improving security consistently...

Comments  (0)


A Look at Infosec Island

December 18, 2011

Rather than giving a security roundup or predicting future security trends for 2012, I thought it a good idea to look at some of the security bloggers over at Infosec Island over the course of the year...

Comments  (1)


Passwords: Give Them the Respect They Deserve

December 16, 2011

Passwords are everywhere on the internet. You need them to log onto your banking, emails and a ton of other websites. They are extremely important, yet do we give them the respect they deserve?

Comments  (0)


Security BSides Planning Epic Phoenix Event

December 15, 2011 Added by:Security BSides

Bummed out after Snowmageddon? Want a nice hot (at least warmer) change of scenery? Arizona is hosting its first ever BSides during one of the best times of year. We aim to provide the highest quality talks, hands on training and workshops. We also have cactus...

Comments  (0)


Measuring Information Security Effectiveness

December 11, 2011 Added by:Bill Gerneglia

“The face of cyber threats has rapidly evolved from curious college kids taking their hand at hacking to an enormous global ecosystem of cyber-crime. Companies need a comprehensive approach to security technology, education and awareness and a very small number have truly mastered all three...”

Comments  (0)


Santa Gets Hacked - Naughty List Leaked (video)

December 09, 2011

Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...

Comments  (3)

Page « < 14 - 15 - 16 - 17 - 18 > »