Items Tagged with "Infosec"
September 14, 2011 Added by:Scot Terban
I have heard others lament the state of the “security industry” and have posted about my own adventures in the land of FUD and Security Theater as well as a side trip into the lands of denial. My goal with this series is to cover the players, the game, and the realities of the security business...
September 14, 2011 Added by:Headlines
The ensemble is somewhat surprising - a collection of both white and black hat innovators who's activities often landed them on either side of the law, but who nonetheless had a tremendous impact on information technology as we know it today...
September 13, 2011 Added by:Headlines
"We are not quite ready to propose a definitive definition... At this point, we are talking about threats that can originate anonymously within this cyber domain with potentially enormous consequences: physical destruction to economic chaos..."
September 12, 2011 Added by:Kanguru Solutions
Every organization has different needs. What works for one may not work for another. Size, budget, personnel, and structure all play a factor in determining what an organization will do in terms of IT security. There generally is no “one size fits all” solution when it comes to Infosec...
September 09, 2011 Added by:Infosec Island Admin
9/9 Special: First 25 that sign up on Sep 9 for ANY training get a $500 discount! With a comprehensive agenda, and a star-studded line up of speakers, Hacker Halted promises to be the premier information security conference of the year in the East Coast. Hackers Are Here. Where Are You?
September 06, 2011 Added by:Headlines
The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...
August 31, 2011 Added by:Security BSides
The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants...
August 30, 2011 Added by:Headlines
"We consider those conclusions to be largely unfounded and not a good measure of the real threat level. Also, we cannot concede that the McAfee analyst was not aware of the groundlessness of the conclusions, leading us to being able to flag the report as alarmist," Eugene Kaspersky said...
August 27, 2011 Added by:Rafal Los
Security professionals need to ensure that we're doing what's right for the developers who will be building more secure software, rather than us security professionals who are adept at bolting on security bits. That's the big revelation here, but of course, only if you believe me...
August 24, 2011
The demands on companies and government to protect networks from exploits that threaten the security of proprietary information have skyrocketed. The dependence on IT systems increased for nearly every business, and so have the financial motivations of criminals...
August 24, 2011 Added by:Rafal Los
We've given up on the notion of securing things and are starting to focus on the idea that security is a journey, and while we're keeping things safe to a pre-defined level of risk tolerance, we need to minimize the damage when the bad people find their ways in and start to kick down doors...
August 23, 2011
Rainer Enders is the CTO at NCP Engineering, and is interested in solving security related issues on all levels of data transfer and communication. NCP engineering delivers software that allows enterprises to rethink their secure remote access and overcome the network complexities...
August 23, 2011 Added by:Christopher Hudel
One risk is that by telling people to "Sentence their password", they may be steered unconsciously to create sentences that make sense which will significantly weaken the power of apparently random words. And of course, apparently random words may ultimately prove not to be too random...
August 23, 2011 Added by:Nick Owen
My goal is to provide infosec professionals a basis for discussing risks with business professionals - especially finance people - and to dispel some myths. The goal of this post is to lay some groundwork for proper financial analysis techniques - or at least minimize the dumber ones...
August 22, 2011
Qualys is the only security company that delivers these solutions through a single Software-as-a-Service platform: QualysGuard'. All of Qualys' on demand solutions can be deployed within hours anywhere around the globe, providing customers an immediate view of their security and compliance posture...
August 21, 2011
Tom Eston is a senior security consultant with Secure State, who's focus is in research on the security of social media and privacy. Tom wrote the popular "Facebook Privacy & Security Guide" which is used for awareness training at several universities and government organizations...