Blog Posts Tagged with "SANS"


Webinar: Top 5 Myths of ICS Cybersecurity - Debunked!

June 14, 2017 Added by:Mike Lennon

What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Join this webinar to learn!

Comments  (0)


Top 5 Things Learned at the SANS Mobile Device Security Summit

March 19, 2012 Added by:Tom Eston

Having a lineup of great speakers really made the summit flow as well as it did. What I liked most about this event was that there were plenty of “real world” talks on how enterprises are setting up and managing mobile deployments…real “in the trenches” types of talks...

Comments  (1)


The SANS Report: The Jester: A Lesson in Asymmetric Warfare

March 05, 2012 Added by:Infosec Island Admin

Asymmetric Warfare Or Annoyance? Perhaps Jester has done things in the background we do not know about and he has not reported to the media, perhaps not. Overall though, the most creative thing he has done is to poison the LOIC. THIS was a real coup and I do appreciate that one...

Comments  (4)


Lilupophilupop SQLi Attack: One Million URLs Infected

January 05, 2012 Added by:Headlines

"When I first came upon the attack there were about 80 pages infected according to Google searches. Today, well as the title suggests we top a million, about 1,070,000 in fact - there will be duplicate URLs that show up in the searches. Still working on a discrete domain list for this..."

Comments  (1)


The Urgent Need for Mobile Device Security Policies

November 20, 2011 Added by:Kevin Johnson

When gaps are uncovered in an environment, they must be augmented with new policies, as is the case with mobile devices. The need for businesses and government to establish strong policies for mobile environments and the protection of information used with mobile devices is immediate...

Comments  (0)


RIP - Cyber Security Expert Dr. Eugene Schultz

October 03, 2011 Added by:Ron Baklarz

Schultz authored/co-authored five books, wrote over 120 published papers and was also a certified SANS instructor, a senior SANS analyst, a member of the SANS NewsBites editorial board, and co-author of the 2005 and 2006 Certified Information Security Manager preparation materials...

Comments  (1)


Big Discounts on Infosec Training and Certifications

August 30, 2011 Added by:Infosec Island Admin

The ISLAND TRADEWINDS program is designed to offer infosec training and certification opportunities at significantly discounted rates. You can receive discounts of up to $500 or 20% on courses from Global Knowledge, Career Academy, SANS, and the Infosec Institute...

Comments  (0)


Tradewinds: Discounts on Infosec Training and Certification

July 31, 2011 Added by:Infosec Island Admin

The ISLAND TRADEWINDS program is designed to offer infosec training and certification opportunities at significantly discounted rates. You can receive discounts of up to $500 or 20% on courses from Global Knowledge, Career Academy, SANS, and the Infosec Institute...

Comments  (4)


Complete PCI DSS Log Review Procedures Part 18 FINAL

March 22, 2011 Added by:Anton Chuvakin

For log exceptions copied from log aggregation tool or from the original log file, make sure that the entire log is copied, especially its time stamp, which is likely to be different from the time of this record, and the system from which it came from - what/when/where, etc...

Comments  (0)


CyberForensics: Understanding Infosec Investigations

January 06, 2011 Added by:Ben Rothke

The book takes a broad look at cyberforensics with various case studies. Each of the books 10 chapters takes a different approach to the topic, and is meant to be a source guide to the core ideas on cyberforensics...

Comments  (0)


Don’t Share Passwords with Co-Workers

November 26, 2010 Added by:Dan Dieterle

Do not share your password with co-workers, or place your password in obvious places, like a sticky note on your monitor or under your keyboard. Also, lock your workstation before you walk away from it even if you think you will only be gone for a short while...

Comments  (5)


A Review of Real World Security Professional Certification

November 18, 2010 Added by:J. Oquendo

The RWSP is the one exam that separates the Pros from the Joes. Unlike conventional exams, there is no method for anyone to cram information for the sake of passing this exam. Unlike the OSCP, OSCE, CPT and CEPT exams, you will not only be put to the test, you will be frustrated...

Comments  (2)


Internet Kill Switch Debate Still Very Alive

November 17, 2010 Added by:Headlines

Regardless of the outcome of the proposed legislation, in the case of a national emergency, Internet access will be marginal at best, and business continuity plans that rely heavily on the notion that employees will be able to login to corporate networks from home are severely flawed...

Comments  (0)


Java Still Presents Soft Target for Malware Threats

November 13, 2010 Added by:Headlines

The exploit is still being proliferated despite the fact that a patch to prevent the infection has been available since July, which is evidence that users have not been as proactive about securing Java as regularly as they update Windows patches...

Comments  (0)


Teaching Computer Forensics

August 24, 2010 Added by:Mark Bennett

In the government sector, cyber attacks on government agencies and contractors, originating from China, have proved difficult to suppress. Incident response and mitigation, class action lawsuits, and fines place remediation costs in the billions of dollars...

Comments  (0)


Feedback on SANS Top 7 Essential Log Reports

August 06, 2010 Added by:Anton Chuvakin

Thanks for overwhelming community response. The list has grown and is on the verge of becoming unwieldy, so I am about to close the comment period, write up the doc - any smokin’ hot log reports to add? Anything I should take OFF the list for not being top and essential?

Comments  (0)

Page « < 1 - 2 > »