Security Awareness


Incident Response Plans and Catching Kittens

August 06, 2010 Added by:Bill Wildprett, CISSP, CISA

Reflecting on this episode, I thought about how I’d been taught about incident response by SANS Institute instructors. The acronym I learned is PICERL; Preparation, Identification, Containment, Eradication, Recovery, Lessons-learned...

Comments  (3)


Get the Most Out of Security Awareness Training

August 05, 2010 Added by:Brent Huston

The whole idea is to turn your personnel into net cops. If you can do that, you can turn your own people into the best IDS system there is, and for a lot less money than you would spend on machines or hosted services…or for cleaning up a security incident...

Comments  (1)


Dr. InfoSec's Quotes of the Week (005)

August 04, 2010 Added by:Christophe Veltsos

Who said: "Eventually, virus writers will realize it is easier to make money by infecting phones than it is by infecting computers... And, of course, there are more phones on this planet than there are computers..."?

Comments  (0)


The Naked Truth About Body Scanners

August 04, 2010 Added by:Ron Baklarz

Contrary to the Transportation Security Administration's insistence that scanned body images cannot be recorded, it seems they are being retained by the machines. The U.S. Marshals Service said it has saved somewhere tens of thousands of images at a single courthouse...

Comments  (0)


Bullet Proof Hosting: Financing and Payment

August 02, 2010 Added by:Nathaniel Markowitz

Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis is a method used by organizations to maximize effectiveness. Generally, these groups analyze internal and external factors to generate strategies to strengthen their business or organizational model...

Comments  (0)


US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)


DTIC and IATAC- Resources for the War on Cyber Terrorism

July 30, 2010 Added by:Jon Stout

Originally developed in World War II as a resource on enemy technology, the DTIC has morphed into a valuable - if underutilized - tool for understanding the technology bases for enemy attacks...

Comments  (0)


Pay Attention to Credit Card Statements

July 29, 2010 Added by:Robert Siciliano

If a credit card company detects irregular spending on your credit card, they may freeze your account or call to verify your identity. While these measures do help secure your card to an extent, they cannot prevent or detect all types of credit card fraud...

Comments  (0)


Facebook Security

July 28, 2010 Added by:Mark Gardner

The volume of users and the lack of a suitable alternative means that this incident won't have far reaching consequences for Facebook. However, it may just place doubts in users minds that when a suitable alternative is available users may begin to switch...

Comments  (1)


Vulnerability Management: The Changing Nature of Attacks

July 27, 2010 Added by:Jon Stout

Cyber terrorism, in addition to attacks on corporate networks, poses a direct threat to the U.S. military, civilian agencies and critical infrastructure. Because of the problems with attributing the attacks to the actual source, this threat has become difficult to contain...

Comments  (1)


Effective WiFi Neighborhood Watch Programs

July 26, 2010 Added by:Christopher Burgess

Neighborhood Watch groups typically focus on observation and awareness as a means of preventing crime and employ strategies that range from simply promoting social interaction and watching out for each other to active patrols by groups of citizens...

Comments  (0)


Dr. InfoSec's Quotes of the Week (004)

July 25, 2010 Added by:Christophe Veltsos

Who said: "Anyone who visits a social networking site should know that it's a business model. The service is not free. We users pay for it with our private data..."?

Comments  (1)


NPR Report Warns of Cyberdefense Shortage

July 23, 2010 Added by:Global Knowledge

James Gosler, who worked at the CIA, the National Security Agency and the Energy Department, estimates that there are only 1,000 or so people in the United States who have the skills necessary to meet our computer security needs. Quite a deficit, no?

Comments  (5)


Washington Post Launches Top Secret America

July 23, 2010 Added by:Lee Mangold

So let me ask the Islanders some questions: Do you think this is responsible reporting? Is it right to publish the locations of the Nations secrets to the world? If you're outside of the US, how would you feel about this in your country?

Comments  (4)


Criminal Communication Infrastructure

July 20, 2010 Added by:Nathaniel Markowitz

One of the central challenges for cyber-criminals is how to communicate with their customers while also maintaining their anonymity. There are three main types of communication utilized by Bulletproof Hosts (BPHs)...

Comments  (0)


What is “Swatting” And How Do I Protect My Family

July 16, 2010 Added by:Robert Siciliano

SWAT is Special Weapons and Tactics. Those are the guys and gals in all black with the headgear and big guns. Caller ID spoofing technologies are used as a tool to disguise the caller and send law enforcement officers on bogus calls...

Comments  (0)

Page « < 48 - 49 - 50 - 51 - 52 > »