Blog Posts Tagged with "Professional"

Bbb285308604bc5fbb9b43590d0501f6

Security BSides Austin 2012: Keeping Security Weird

February 23, 2012 Added by:Security BSides

BSides Austin is an eclectic group of infosec pros gathered to hear awesome talks and have outrageously fun discussions. Our mission is to provide an inclusive, some say quirky, yet open environment for sharing and collaborative discourse on security topics that most interest you...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Security: UR Doin It Rong

February 22, 2012 Added by:Wendy Nather

A number of talks at conferences focus on what we are doing wrong. The reason for this is practitioners are afraid to talk about how they're defending themselves for fear that someone will take it as a challenge and de-cyber-pants them before they've even gotten to the Q&A session...

Comments  (3)

69850a58aa122f9d42c80b2d502dec6a

The Differences Between Security Certifications

February 17, 2012 Added by:Joshua Lochner

It seems like certifications have always been a source of contention for IT professionals. What are “The Right” certifications to get? Are they needed? Which ones would someone reap the most benefit from? Who cares?

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

The Fundamentals of Infosec in Theory and Practice

February 14, 2012 Added by:Ben Rothke

Information security is an overwhelming body of knowledge, and for many it can indeed be a far too tremendous body of text to attempt to cover. To that effort this book is an invaluable resource as it covers the key areas without getting bogged down in the minutia...

Comments  (0)

1a490136c27502563c62267354024cd5

Brad Smith: The Power of the Ultimate Social Engineer

February 11, 2012 Added by:Malgorzata Skora

While we often focus on how social engineering skills can be used to break into companies or otherwise obtain information that is supposed to be protected, Brad demonstrates the positive aspects of these skills, and shows how they can be put to good use...

Comments  (1)

Ebe141392ea3ebf96ba918c780ea1ebe

Insecure At Any Speed

February 09, 2012 Added by:Wendy Nather

Security is an afterthought, and a bad one at that. As long as it remains separate from the systems it's supposed to protect, instead of an attribute, and requires users to maintain an abnormal level of awareness, security is going to continue to be as bad as it is today...

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Does Offensive Security Really Exist?

February 09, 2012 Added by:Dave Shackleford

I want to refute the concept of offensive vs. defensive security staff. It's not realistic. Reason? Offense really exists for one reason – to inform defense. In my mind, this really means we’re ALL defense. We just accomplish our defensive strategy and tactics in different ways...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides San Francisco: Speakers and Topics Lineup

February 08, 2012 Added by:Security BSides

The goal of Security BSides is to expand the spectrum of conversation beyond the traditional confines of space and time. The conferences create opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration...

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Doom, Gloom, and Infosec

February 06, 2012 Added by:Dave Shackleford

I’m perennially happy, but I get the impression that many in infosec are not. Everyone is different, and I don’t want to stereotype, but I do run into a lot of gloomy folks. Why is the infosec profession so unhappy in general?

Comments  (1)

B09c361cbdc6cf629affdc7db30a186d

Designing Security with Brand in Mind

February 06, 2012 Added by:Steven Fox, CISSP, QSA

Why is it important to deliver security services consistent with your brand? The fundamental archetype created by your brand must be supported by behaviors which confirm its relevance. Performance that is inconsistent will lead your customers to question your brand promise...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Tech Continues to Bedevil Infosec and Privacy Practitioners

January 30, 2012 Added by:Rebecca Herold

Organizations need to get off the stick, do risk assessment to determine the extent of personal computing device use within their organizations and then update their policies, create new procedures, and implement new technologies accordingly...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Participate in the Infosec Career Attitudes Survey

January 11, 2012 Added by:Jack Daniel

This specific survey was selected because it is a standard measurement recognized by folks who study such things; this means aggregated results can be used for comparison with other professions (where there is survey data available) and averages...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

How to Re-Awaken Your Inner Hacker

January 04, 2012 Added by:Rafal Los

Information security cannot be a population of sheep, zombies or whatever other metaphor we want to use - we must be the most innovative thinkers, the ones who truly do think different and always question everything. With that in mind - here are some things I recommend...

Comments  (1)

888605c6c25c19e41bbbb986ea6d43c1

The Human Factor

December 24, 2011 Added by:Jim Palazzolo

When we truly understand that every server we secure, policy enforced, card swipe device locked down, banking website code scrubbed, and public facing connection port blockaded has a human being at the end we will then fully grasp the concept of "defense-in-depth"...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Enterprise Information Security Resolutions for 2012

December 18, 2011 Added by:Robb Reck

Successful information security is about making progress. It’s not reasonable or sustainable to expect all risks to be remediated as soon as they are discovered. Instead, my goal for 2012 will be to establish a positive trend, working toward improving security consistently...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Plagiarism in IT Security - Walking a Fine Line

December 09, 2011 Added by:Rafal Los

At the end of the day, shouldn't we all be professionals? I know it's nice to think that everyone is honest - but as the infosec world expands and there is a massive influx of people trying to make a name for themselves - there will be dishonesty. This is where the community comes in...

Comments  (2)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked