Information Security

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Risk Management

February 10, 2012

A short illustration of risk management. Demonstrating the concepts of risk mitigation, acceptance, avoidance and transfer. Learn these concepts well and you’ll do well in your CISSP exam...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Forgotten Passwords and Security

February 03, 2012

What do you do when a user forgets their password? There are a number of different approaches that can be taken. The challenge when allowing a user to self-service is that you could potentially open up a number of avenues for attack...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Importance of Online Safety

January 28, 2012

Taking on the topic of not trusting people online, I thought it would be a good idea to make a PSA style video. Like most of my video’s, it turned out different than I initially envisioned it to be, and hence it’s a lot darker and more serious than my previous offerings...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Interview with ISMP Founder Marisa Fagan on SECore

January 27, 2012

Marisa Fagan, the founder of the InfoSec Mentors Project - "a non-profit project that builds a more collaborative and friendly environment for newbies in information security" - kindly dropped by from across the pond to talk about SECore.info...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Do Not Encrypt Passwords - Why, You Ask?

January 12, 2012

Encrypting passwords is bad. Try hashing them with a little bit of salt on top. Confused about the terminology - maybe i can clear your confusion with the use of a shoe, a box and a pen & paper...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Malware Analysis: How to Decode JavaScript Obfuscation

January 05, 2012

When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation. What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Input Validation

December 29, 2011

Input validation is a good security principle based on your application looking at what’s being asked of it and deal in a secure manner. It’s not always fool proof, but goes a long way...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

A Look at Infosec Island

December 18, 2011

Rather than giving a security roundup or predicting future security trends for 2012, I thought it a good idea to look at some of the security bloggers over at Infosec Island over the course of the year...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Passwords: Give Them the Respect They Deserve

December 16, 2011

Passwords are everywhere on the internet. You need them to log onto your banking, emails and a ton of other websites. They are extremely important, yet do we give them the respect they deserve?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cybersecurity in Waste Water and Water Control Systems

December 14, 2011

The first of a monthly webinar series on Industrial Control System (ICS) Cybersecurity is now available for review in this video. This session provides insight for those interested in ICS Cybersecurity including policy makers, asset owners, vendors, consultants and integrators....

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Santa Gets Hacked - Naughty List Leaked (video)

December 09, 2011

Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...

Comments  (3)

99edc1997453f90eb5ac1430fd9a7c61

Avoiding Security Budget Cuts

November 28, 2011

Companies are cutting back on information security departments budgets. I have, however, come up with an ingenious plan by which security departments can keep their funding without costing the company any money whatsoever. I’m pretty sure no-one has come up with this idea before...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Conference Director Leonard Chin

November 08, 2011

Leonard was instrumental in the conceptualization and organization of EC-Council's first Hacker Halted Conference in the United States in 2008 and has been the conference director for this conference series since then. From Myrtle Beach in 2008, he brought the event to Miami...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Jeremiah Grossman on Hacking Websites

November 06, 2011

"Fundamentally the answer to the software security question can be found through metrics. By carefully tracking and analyzing metrics, very particular key performance indicators (KPIs), an organization can determine where resources would be best invested..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Mike Dahn and Martin McKeay on Compliance in the Cloud

November 03, 2011

"Your management fears the auditors more than the hackers. So why is it they're looking at moving cardholder data so quickly? Because 'cloud computing' is the new marketing buzzword that promises to do everything..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: McAfee's George Kurtz Discusses the War on Security

October 31, 2011

"The current cybersecurity model is disconnected and unable to keep pace with the seismic explosion in malware. Providing protection to a heterogeneous world of connected devices requires a new approach to security. McAfee CTO George Kurtz will explain the required paradigm shift..."

Comments  (1)


« First   < Previous   | 2 - 3 - 4 - 5 - 6 |   Next >   Last »