Latest Blog Posts
October 26, 2010 Added by:Bill Gerneglia
The 6th Annual Security Survey of IT Executives and Network Administrators found that among large companies with 5,000 or more U.S. employees, 67 percent reported an intrusion of user machines, office network or servers during the last two years. The largest percentage yet found...
October 26, 2010 Added by:Pete Herzog
In operational trust analysis, you learn to use logic and reason to make a trust decision. It is a new practice developed by ISECOM to explore operational trust in Trusted Computing as part of the EU's Open Trusted Computing (OpenTC) project...
October 26, 2010 Added by:Javvad Malik
Good security practices can help you ensure that you can tie down everything within your control whilst recognizing there are aspects outside of your control which can impact these. Building another site would ensure business functions continue as normal through a disaster scenario...
October 26, 2010 Added by:Danny Lieberman
The problem with software patents goes far beyond being an abstract mathematical algorithm or not, since most software is about ways of doing business or implementing consumer electronics, as opposed to innovative computational algorithms...
October 25, 2010 Added by:Robb Reck
Drop My Rights is a free Windows XP utility offered by Microsoft that allows you to be logged into your computer as an administrator while running high risk programs like Internet Explorer, Firefox and Outlook with reduced privileges...
October 25, 2010 Added by:PCI Guru
As I constantly like to remind everyone, security is not perfect. Social engineering is one of the most insidious attack techniques around. Unfortunately, organizations do little to address social engineering and have only made social engineering easier over the years...
October 25, 2010 Added by:Bill Wildprett, CISSP, CISA
My challenge and task is to apply this modality of critical thinking to the domains of information security, along with that of the OSSTMM. Like more physical exercise will clean the arterial plaque from your personal system, it’s important to floss your brain and defrag your mind...
October 25, 2010 Added by:Robert Gezelter
The effort being focused on Google would be far better spent on educating users about the hazards. Google is caught being an identifiable target. The Street Wise vehicle cruising down the block every few years is not a serious hazard to privacy and security...
October 25, 2010 Added by:Dan Dieterle
Many American businesses and home users don’t focus on securing their systems, or simply don’t care. You have 2 to 15 guys protecting your network; they have the manpower to task 1,000 hackers to penetrating your system if you have something they want. Who is going to win that battle?
October 24, 2010 Added by:Anthony M. Freed
As Natalie Petouhoff of Forrester Research noted, social media isn't a choice anymore - it's a business transformation tool. With that said, firms that have not yet embraced social media need to approach it in a cautious manner, rather than blindly drinking it like Kool-Aid...
October 24, 2010 Added by:Guy Huntington
There are many different identity types interacting with a modern enterprise and identity type gradients. The risk associated with these identity gradients may vary according to the purchase amount, or type of information flowing between the enterprise and the identity type gradient..
October 24, 2010 Added by:bitraptor bitraptor
SAM is far from being perfect, but the real problem lies in the way they store the passwords - it's an old method created by Microsoft prior to the Windows NT family, and they still run the old style LM hash keys so that two concurrent hashes of the passwords are stored...
October 23, 2010 Added by:Anton Chuvakin
LogChat Podcast is back - and now on iTunes as well. Everybody knows that all this world needs is a podcast devoted to logs, logging and log management - as well as SIEM, incident response and other closely related subjects - and now you have it...
October 23, 2010 Added by:Katie Weaver-Johnson
Before you hand over that phone to provide some extra entertainment when you get stuck in line at a restaurant, you may want to make sure all other applications are locked down, you have signed out of your email and other social networking sites...
October 23, 2010 Added by:Global Knowledge
Depending on the job role, Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management of all government employees who conduct Information Assurance functions in assigned duty positions...