Network Access Control

99edc1997453f90eb5ac1430fd9a7c61

Films that needed better infosec

May 16, 2010 Added by:Javvad Malik

Many times its difficult to illustrate the benefits of following good information security advice. Company's tend to keep quiet about their failings so there are few case study's available to analyse. But not to fear, the cynic has improvised and analysed 8 movies whose entire outcomes could have been changed had some simple infosec guidelines been adhered to.

Comments  (5)

F6bae6ee0c7dfe5b62860cc8ebf311fe

Policing Dirty Networks & Applications - Using the OSI model to fault find network and applications

May 11, 2010 Added by:John England

I've just read a nice blog from Ray Tan on the importance of the OSI model, and how theory should map to practise. I for one am an advocate of this, and I thought I would share my little common sense system for logical fault finding based on a shortened version of the OSI model. One to share with the less enlightened!

Comments  (1)

D97bed96d5646177251e99b9567b1392

Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Hacktivist Tactics Raise Ethical Questions

January 27, 2010 Added by:Anthony M. Freed

Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question:  Where do cyber vigilantes fall on the infosec ethics spectrum?

Comments  (19)

F0a7d979c6e57d746e1164ed6e44678e

Is the Recent Chinese Google Hack the most Serious Privacy Breach of the Year?

January 21, 2010 Added by:Brent Carey

Last week Google announced that it was the victim of a hack in China. Word of the attack spread quickly and the German, French and Australian governments issued warnings about using internet Explorer. I'm amazed that this incident has not received more commentary from the privacy and security communities. Is this not   the most serious data privacy breach in a search engine’s histo...

Comments  (1)

Page « < 27 - 28 - 29 - 30 - 31 > »