Latest Posts

Ebb72d4bfba370aecb29bc7519c9dac2

Security Monitoring Planning Tool?

April 24, 2014 Added by:Anton Chuvakin

The easy stuff is for wussies – how about I dedicate my time to creating a structured approach for deciding which monitoring technology to use under various circumstances?

Comments  (0)

Default-avatar

The Enterprise Network: Effective Protection Strategies

April 24, 2014 Added by:John Grady

The first step is to think strategically, which means creating policies and procedures aimed at the enterprise network as a whole rather than handling issues case by case.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Verizon 2014 DBIR: Hide Your Servers and Call the Cops

April 23, 2014 Added by:Tripwire Inc

Know what you have, know how it’s vulnerable, configure it securely, and continuously monitor it to ensure it isn’t compromised and remains secure.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

2014 SecurityWeek Golf Classic to Take Place May 22 at Half Moon Bay

April 23, 2014 Added by:InfosecIsland News

SecurityWeek Invites You to Participate in The 2014 SecurityWeek Golf Classic! Our first classic is being held on May 22, 2014 at the prestigious world-class Ocean Course at Half Moon Bay, located just 23 miles from San Francisco International Airport.

Comments  (0)

296634767383f056e82787fcb3b94864

6 Minutes That Can Change Your Security Start-up's Life

April 23, 2014 Added by:Jeffrey Carr

On May 19th the Suits and Spooks Security Start-up Speed Lunch will give each founder of up to 20 cyber security start-ups an opportunity to spend 6 minutes to pitch a product to a Director or higher-level executive at a private table in an exclusive setting.

Comments  (0)

6d117b57d55f63febe392e40a478011f

NIST Abandons Cryptography Algorithm in Wake of NSA Backdoor Concerns

April 22, 2014 Added by:Anthony M. Freed

NIST has officially announced the decision to remove the cryptographic algorithm from its revised guidance on random number generators

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Let’s Get Proactive with End User Security

April 22, 2014 Added by:Brent Huston

Powerful malicious software apps are all over the Net, like website land mines, just waiting to explode into your computer if you touch them.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Verizon Publishes Vastly Expanded Data Breach Investigations Report (DBIR)

April 22, 2014 Added by:InfosecIsland News

Point-of-sale (PoS) attacks are declining, while Web application attacks and cyber-espionage is increasing, according to the latest edition of the annual Verizon Data Breach Investigations Report (DBIR).

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Interview with Chris Petersen, LogRhythm co-founder

April 22, 2014 Added by:Robb Reck

In March I began my quest to interview some of the most interesting folks in the Colorado security community. I had the pleasure of sitting down with Chris Petersen, CTO and co-founder of LogRhythm.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Detecting OpenSSL-Heartbleed with Nmap & Exploiting with Metasploit

April 21, 2014 Added by:Dan Dieterle

You can now quickly detect the OpenSSL-Heartbleed vulnerability very quickly on a network using the ever popular nmap command, and with the latest modules from Metasploit you can quickly see the exploit in action.

Comments  (0)