Latest Posts


Security Monitoring Planning Tool?

April 24, 2014 Added by:Anton Chuvakin

The easy stuff is for wussies – how about I dedicate my time to creating a structured approach for deciding which monitoring technology to use under various circumstances?

Comments  (0)


The Enterprise Network: Effective Protection Strategies

April 24, 2014 Added by:John Grady

The first step is to think strategically, which means creating policies and procedures aimed at the enterprise network as a whole rather than handling issues case by case.

Comments  (0)


Verizon 2014 DBIR: Hide Your Servers and Call the Cops

April 23, 2014 Added by:Tripwire Inc

Know what you have, know how it’s vulnerable, configure it securely, and continuously monitor it to ensure it isn’t compromised and remains secure.

Comments  (0)


2014 SecurityWeek Golf Classic to Take Place May 22 at Half Moon Bay

April 23, 2014 Added by:InfosecIsland News

SecurityWeek Invites You to Participate in The 2014 SecurityWeek Golf Classic! Our first classic is being held on May 22, 2014 at the prestigious world-class Ocean Course at Half Moon Bay, located just 23 miles from San Francisco International Airport.

Comments  (0)


6 Minutes That Can Change Your Security Start-up's Life

April 23, 2014 Added by:Jeffrey Carr

On May 19th the Suits and Spooks Security Start-up Speed Lunch will give each founder of up to 20 cyber security start-ups an opportunity to spend 6 minutes to pitch a product to a Director or higher-level executive at a private table in an exclusive setting.

Comments  (0)


NIST Abandons Cryptography Algorithm in Wake of NSA Backdoor Concerns

April 22, 2014 Added by:Anthony M. Freed

NIST has officially announced the decision to remove the cryptographic algorithm from its revised guidance on random number generators

Comments  (0)


Let’s Get Proactive with End User Security

April 22, 2014 Added by:Brent Huston

Powerful malicious software apps are all over the Net, like website land mines, just waiting to explode into your computer if you touch them.

Comments  (0)


Verizon Publishes Vastly Expanded Data Breach Investigations Report (DBIR)

April 22, 2014 Added by:InfosecIsland News

Point-of-sale (PoS) attacks are declining, while Web application attacks and cyber-espionage is increasing, according to the latest edition of the annual Verizon Data Breach Investigations Report (DBIR).

Comments  (0)


Interview with Chris Petersen, LogRhythm co-founder

April 22, 2014 Added by:Robb Reck

In March I began my quest to interview some of the most interesting folks in the Colorado security community. I had the pleasure of sitting down with Chris Petersen, CTO and co-founder of LogRhythm.

Comments  (0)


Detecting OpenSSL-Heartbleed with Nmap & Exploiting with Metasploit

April 21, 2014 Added by:Dan Dieterle

You can now quickly detect the OpenSSL-Heartbleed vulnerability very quickly on a network using the ever popular nmap command, and with the latest modules from Metasploit you can quickly see the exploit in action.

Comments  (0)