Security Awareness


Security Patents Invite Hacker Exploitations

August 24, 2010 Added by:Joe Morrissey

If you had devised a new, novel, non-obvious lock for protecting your house – would you give thieves a drawing of the lock so they could fabricate a key? No, bloody right you wouldn’t – nor would I. But in filing a patent, that is exactly what we would be required to do...

Comments  (17)


Ten Most Dangerous Celebrities in Cyberspace

August 23, 2010 Added by:Robert Siciliano

For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web...

Comments  (0)


Data Security Breaches Wreak Havoc

August 23, 2010 Added by:Danny Lieberman

I am at a loss to understand why the US needs another data security bill. Looking at data security as an exercise in providing cost effect security countermeasures, it appears to me that the bill is most likely either a public relations play or congressional logrolling...

Comments  (1)


Spies Among Us

August 22, 2010 Added by:Robert Siciliano

The term spy conjures ideas about foreign operatives, moles and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. The eleven Russian spies recently nabbed used the same equipment that you and I use today, including laptops, flash memory cards, and cell phones, but with a twist...

Comments  (0)


Cyber Warfare and the Conflict in Iraq

August 20, 2010 Added by:Theresa Payton

This paper recognizes some denied and approved cyber attacks that have been used in Iraq, identifies the major causes of the United States’ apprehension about using cyber warfare, and analyzes how the United States can streamline future use of cyber warfare...

Comments  (1)


Where Plaintiff's Went Wrong with Heartland Suit

August 19, 2010 Added by:Carter Schoenberg

One area I continue to grow frustrated with is when a large security breach occurs and yet other than FTC sanctions, not much else happens. Why? I think its along the same lines as why most CISO's complain that CEO's don't take security as serious as they should...

Comments  (0)


4 Steps to Managing Your Security Documents

August 18, 2010 Added by:Sean Inman

There are many document management systems out there, both proprietary and open-source. Document management isn’t just storing documents, its a process of reviews, approvals, storage and communication . So lets dissect these processes...

Comments  (4)


Security and Privacy in 2010

August 16, 2010 Added by:Mark Gardner

Wikileaks thrives because of a lack of openness, leading to the conclusion that there is potential for more openness in all Government. However, as in our private lives, some things should stay just that - private - particularly with regard to areas of national security...

Comments  (0)


Summertime Scams and Identity Theft

August 14, 2010 Added by:Robert Siciliano

For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. this summer's hottest scams include:

Comments  (0)


Virtual doors Keep Out the Uninvited

August 11, 2010 Added by:Christopher Burgess

Your connected devices allow you the opportunity to literally bring the world to your doorstep. There exists unfortunately, a malicious minority of individuals, as well as, organized criminal entities which prey on those of us whose online virtual doors are invitingly open...

Comments  (0)


Incident Response Plans and Catching Kittens

August 06, 2010 Added by:Bill Wildprett, CISSP, CISA

Reflecting on this episode, I thought about how I’d been taught about incident response by SANS Institute instructors. The acronym I learned is PICERL; Preparation, Identification, Containment, Eradication, Recovery, Lessons-learned...

Comments  (3)


Get the Most Out of Security Awareness Training

August 05, 2010 Added by:Brent Huston

The whole idea is to turn your personnel into net cops. If you can do that, you can turn your own people into the best IDS system there is, and for a lot less money than you would spend on machines or hosted services…or for cleaning up a security incident...

Comments  (1)


Dr. InfoSec's Quotes of the Week (005)

August 04, 2010 Added by:Christophe Veltsos

Who said: "Eventually, virus writers will realize it is easier to make money by infecting phones than it is by infecting computers... And, of course, there are more phones on this planet than there are computers..."?

Comments  (0)


The Naked Truth About Body Scanners

August 04, 2010 Added by:Ron Baklarz

Contrary to the Transportation Security Administration's insistence that scanned body images cannot be recorded, it seems they are being retained by the machines. The U.S. Marshals Service said it has saved somewhere tens of thousands of images at a single courthouse...

Comments  (0)


Bullet Proof Hosting: Financing and Payment

August 02, 2010 Added by:Nathaniel Markowitz

Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis is a method used by organizations to maximize effectiveness. Generally, these groups analyze internal and external factors to generate strategies to strengthen their business or organizational model...

Comments  (0)


US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)

Page « < 49 - 50 - 51 - 52 - 53 > »