Items Tagged with "Infosec"


7fef78c47060974e0b8392e305f0daf0

Israeli and Muslim Hackers Bring Knives to Gun Fight

January 19, 2012 Added by:Infosec Island Admin

There was the dropping of the SCADA passwords recently, and that is more along the lines of doing something. As I wrote recently about cyberwar, the real aegis is to damage infrastructure, supply chain failure, and in the end invade or conduct military operations...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

How To Choose A Security Vendor

January 16, 2012 Added by:Brent Huston

Variations exist in depth, skill level, scope, reporting capability, experience, etc. Selecting security testing vendors based upon price is a bad idea. Matching specific experience, reporting styles and technical capabilities to your environment is a better solution...

Comments  (0)

C70bb5cfd0305c9d18312d92f820c321

On Defending Networks

January 13, 2012 Added by:Gabriel Bassett

If we can secure areas of the world existing in at least 3 domains (land, air, and space) if not four (adding sea), then we should easily be able to train to defend networks existing in a single domain (digital)...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Participate in the Infosec Career Attitudes Survey

January 11, 2012 Added by:Jack Daniel

This specific survey was selected because it is a standard measurement recognized by folks who study such things; this means aggregated results can be used for comparison with other professions (where there is survey data available) and averages...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides London 2012: Call for Papers

January 09, 2012 Added by:Security BSides

We’re looking for speakers for B-Sides London 2012. Once the deadline is reached the CFP will be closed and submissions will be peer reviewed. The process will be complete on February 20th. Selected talks will be slotted into streams and published on the B-Sides London website...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Malware Analysis: How to Decode JavaScript Obfuscation

January 05, 2012

When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation. What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

How to Re-Awaken Your Inner Hacker

January 04, 2012 Added by:Rafal Los

Information security cannot be a population of sheep, zombies or whatever other metaphor we want to use - we must be the most innovative thinkers, the ones who truly do think different and always question everything. With that in mind - here are some things I recommend...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Secure Communications for CERTs and Stakeholders

December 29, 2011

ENISA seeks to identify the most suitable technology and platform to provide secure channels to improve communications with CERTs and other stakeholders. Secure transportation of information assures some combination of confidentiality, integrity and authenticity of the data...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Want Rapid Feedback? Try a Web Application Security Scan

December 27, 2011 Added by:Brent Huston

While this service finds a number of issues and potential holes, we caution against using it in place of a full application assessment or penetration test if the web application in question processes critical or highly sensitive information...

Comments  (0)

888605c6c25c19e41bbbb986ea6d43c1

The Human Factor

December 24, 2011 Added by:Jim Palazzolo

When we truly understand that every server we secure, policy enforced, card swipe device locked down, banking website code scrubbed, and public facing connection port blockaded has a human being at the end we will then fully grasp the concept of "defense-in-depth"...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Enterprise Information Security Resolutions for 2012

December 18, 2011 Added by:Robb Reck

Successful information security is about making progress. It’s not reasonable or sustainable to expect all risks to be remediated as soon as they are discovered. Instead, my goal for 2012 will be to establish a positive trend, working toward improving security consistently...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

A Look at Infosec Island

December 18, 2011

Rather than giving a security roundup or predicting future security trends for 2012, I thought it a good idea to look at some of the security bloggers over at Infosec Island over the course of the year...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Passwords: Give Them the Respect They Deserve

December 16, 2011

Passwords are everywhere on the internet. You need them to log onto your banking, emails and a ton of other websites. They are extremely important, yet do we give them the respect they deserve?

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides Planning Epic Phoenix Event

December 15, 2011 Added by:Security BSides

Bummed out after Snowmageddon? Want a nice hot (at least warmer) change of scenery? Arizona is hosting its first ever BSides during one of the best times of year. We aim to provide the highest quality talks, hands on training and workshops. We also have cactus...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Measuring Information Security Effectiveness

December 11, 2011 Added by:Bill Gerneglia

“The face of cyber threats has rapidly evolved from curious college kids taking their hand at hacking to an enormous global ecosystem of cyber-crime. Companies need a comprehensive approach to security technology, education and awareness and a very small number have truly mastered all three...”

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Santa Gets Hacked - Naughty List Leaked (video)

December 09, 2011

Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...

Comments  (3)

Page « < 14 - 15 - 16 - 17 - 18 > »