Security Awareness

7fef78c47060974e0b8392e305f0daf0

An Introduction to OSSTMM Version 3

July 15, 2010 Added by:Infosec Island Admin

As a security consultant, I've always looked for ways to increase consistency, efficiency and value when conducting security analysis on a client's network or business. With the impending release of OSSTMMv3 I'll share my thoughts on the success of the model...

Comments  (19)

37d5f81e2277051bc17116221040d51c

Security Cameras Can Speak Volumes

July 15, 2010 Added by:Robert Siciliano

Cameras are everywhere. We are on camera at most retails stores, banks, ATMs, busy intersections, highways, downtown areas and in neighborhoods. It keeps the honest people honest and the bad guys in-check or in jail...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

HITB 2010 Amsterdam Keynote

July 14, 2010 Added by:Anton Chuvakin

The main theme of my speech was that we have essentially two securities - one where people do paper risk assessments, "align strategy" and enable business and another where people actually deal with consequences of intrusions and other burning technical issues...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Top Trends in Information Security

July 13, 2010 Added by:Theresa Payton

Another big concern is funding. The usual trend is when the time to write the budget comes around and they see something, somewhere, needs to be cut, Information Security is at the top of the list...

Comments  (2)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (003)

July 11, 2010 Added by:Christophe Veltsos

Who said: "The biggest vulnerability we face today and the future is not the thing that the technical security person would think of, like a botnet or technical flaw, but the misperception of risk..."?

Comments  (0)

Af2769c2480db78c589b811b428782b0

NSA Launches Perfect Citizen

July 10, 2010 Added by:Lee Mangold

There's been a lot of talk on the Island about the cyberwar term and this is yet another example: The Wall Street Journal reported that the NSA allegedly awarded a contract to Raytheon for an Information Security program called Perfect Citizen...

Comments  (11)

4e714dc795dc50b932e2a837e3efc472

Three Pillars of Information Security

July 02, 2010 Added by:Joe Morrissey

An overview of Confidentiality, Integrity and Availability.

Comments  (4)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (002)

June 30, 2010 Added by:Christophe Veltsos

"The software industry is really one of the only organizations where you can knowingly build a defective product and push it out to a potential buyer and the buyer assumes all the risk." -- Jerry Davis, CISO for NASA

Comments  (1)

Dd9902bc56a9d85cdc62c00083ea4871

Organizational Security: Is Your Door Wide Open?

June 29, 2010 Added by:Katie Weaver-Johnson

Last Tuesday at about 2:00 AM, I woke up to the doorbell ringing and knocking on our front door. While I was initially a little startled, my next thought was, “Why isn’t our ferocious guard dog barking?”

Comments  (3)

5e402abc3fedaf8927900f014ccc031f

The Cost For Securing Your Data vs. The Cost to Replace Your Data

June 25, 2010 Added by:Allan Pratt, MBA

Computer security has been part of my best practices since I purchased my first computer way back in 1995 and experienced the Internet for the first time. All of my home systems are always protected with host-based IDS, software backups, and regular maintenance. However, I had a “wow” computer security moment recently.

Comments  (1)

924ce315203c17e05d9e04b59648a942

New Federal Cyber Security Work Group

June 23, 2010 Added by:Richard Stiennon

A few weeks ago I participated in a cyber roundtable pulled together in Washington DC. This was, in part, a meeting to kick off a new organization that will seek to bring security technologists and policy makers together.  (Much more on this at a later date). 

Comments  (0)

F8f122d50eba11c3af5607575b277bc6

Why Simple Can Be Secure

June 23, 2010 Added by:Bryan Miller

I'm often asked why security has to be so expensive. A lot of my time is spent preaching to clients about the need for increased security. Every day brings another new vulnerability to our computing infrastructure. Hardly a day goes by when we are not bombarded with headlines claiming that another famous company has been hacked, or that our credit card numbers have been stolen by anonymous cyber t...

Comments  (4)

6d117b57d55f63febe392e40a478011f

Battling the Information Security Paradox

June 22, 2010 Added by:Anthony M. Freed

Information security is still not garnering appropriate attention from the executive level at some of the largest companies in the world, many of whom are engaged in business activity considered critical to the nation's infrastructure.

Comments  (1)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (001)

June 21, 2010 Added by:Christophe Veltsos

In this issue, the Economics of Targeted Attacks, Bonnie, Clyde & Cybercrime, Privacy & Internet, Password & Lemons and other great infosec quotes from around the world.

Comments  (0)

F8f122d50eba11c3af5607575b277bc6

Embracing a Security Audit

June 21, 2010 Added by:Bryan Miller

In the April 2004 edition of Information Security magazine, George Wrenn writes about "Surviving an Audit". In the article he gives advice from a client's perspective on how to best work with an auditing team, whether the team is internally or externally based. Mr. Wrenn provides many good tips on how to gain the most benefit from a security audit, and most important on what to do after ...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

Social Media Policy

June 21, 2010 Added by:Javvad Malik

A humourous look at the realities in many organizations surrounding Social Media and the associated security risks and policy decisions.

Comments  (3)

Page « < 49 - 50 - 51 - 52 - 53 > »