Blog Posts Tagged with "Training"


BSidesDetroit: ConBlu, and a First Try at Presenting

June 03, 2012 Added by:Scott Thomas

The great thing about the people (and our industry as a whole) is that people attending were willing to share their thoughts and what they did to stave off burnout. The conference itself was awesome. The different tracks made it easy to have hallway-con, as well having a teaching area, and a lock-pick village...

Comments  (0)


Conferring about Security Conferences

May 30, 2012 Added by:Wendy Nather

There's a great discussion going on right now on Twitter about what's wrong with security conferences: Do we have too many? Are they focusing on the wrong things? Even if the hot topics are nominally the same, the perspectives and timbre of discussions will be very different...

Comments  (1)


NIST Workshop: Safeguarding Health Information

May 30, 2012 Added by:Infosec Island Admin

The HIPAA Security Rule sets federal standards to protect the confidentiality, integrity and availability of electronic protected health information by requiring HIPAA covered entities and their business associates to implement and maintain administrative, physical and technical safeguards...

Comments  (0)


Metasploit: The Penetration Tester’s Guide - A Review

May 28, 2012 Added by:Dan Dieterle

The exploiting sections are very good, covering the famous exploitation techniques of attacking MS SQL, dumping password hashes, pass the hash & token impersonation, killing anti-virus and gathering intelligence from the system to pivot deeper into the target network...

Comments  (0)


NSA Announces New Program for Careers in Cyber Ops

May 23, 2012 Added by:Headlines

Many of the nation's colleges and universities offer courses or promote projects in cybersecurity. NSA's new program differs in that it integrates the relevant academic disciplines, with a focus on technology and the techniques associated with specialized cyber operations...

Comments  (0)


A Meandering Rant on Sexism in Security

May 22, 2012 Added by:Jack Daniel

The depressing “booth babe” situation is an ongoing embarrassment. In the right contexts, I have nothing against attractive people, fast cars, or other things normally used to sell cheap beer - I just don’t believe that tech and security events are the correct contexts...

Comments  (2)


ICS-CERT: From the Trenches - A Tabletop Exercise

May 22, 2012 Added by:Infosec Island Admin

Incident response is critical. During a real incident, you don’t want to discover major gaps in policy/procedure and/or technology tools. The collaboration that occurs during the exercise helps to understand the roles and responsibilities that each of us have during cyber attacks...

Comments  (0)


Infosec and the Death of the Rabbi

May 17, 2012 Added by:Carter Schoenberg

What is more valuable, a SCADA security pro that understands a plant with such detail that his knowledge may never be rivaled, or a person who can also understand the organizations mission need and business drivers and can translate security into quantified risk measurements...

Comments  (2)


NIST Workshop: The Technical Aspects of Botnets

May 16, 2012 Added by:Infosec Island Admin

NIST seeks to engage all stakeholders to identify the available and needed technologies and tools to recognize, prevent, and remediate botnets; explore current and future efforts to develop botnet metrics and methodologies for measuring and reporting botnet metrics over time...

Comments  (0)


Security BSides Detroit Announces its June Schedule

May 15, 2012 Added by:Steven Fox, CISSP, QSA

The BSides conference is billed as a un-conference where practitioners go for clear unfiltered view of the industry. The conference features two tracks and thirty-two talks of local and national experts on a variety technical and non-technical subjects...

Comments  (0)


FBI Guidance of Combating the Insider Threat

May 15, 2012 Added by:Infosec Island Admin

The thief who is harder to detect and who could cause the most damage is the insider — the employee with legitimate access. They may steal solely for personal gain or be a “spy”—someone who is stealing company information or products in order to benefit another organization or country...

Comments  (0)


Are We Reaching Security Conference Overload?

May 13, 2012 Added by:Tom Eston

We have more security and hacking conferences than ever, but now there is also more overlap. These choices can make it harder for researchers to present new and relevant content and also tough to decide which conferences to attend from a attendee perspective...

Comments  (0)


Webinar: Keeping Your Open Source Software Secure

May 09, 2012 Added by:Infosec Island Admin

Understand why collaboration is invaluable in keeping proprietary systems secure. Learn how to share private information in public forums without harming your organization. Identify what tools are available to your organization for collaboration, notification, and knowledge-sharing...

Comments  (0)


CISSP Reloaded Domain 7: Applications and Systems Development

May 08, 2012 Added by:Javvad Malik

Secure applications aren’t the result of evolution or chance conditions coming together. Secure applications are only created with a definite degree of intelligent design. You, as the security person are responsible for providing that intelligent design into the application...

Comments  (0)


Infosec Island Seeks Industry Partners for Security Conferences

May 07, 2012 Added by:Infosec Island Admin

Through a combination of custom content publication that features products and services, video interviews with company personnel onsite, and traditional banner ad campaigns, organizations can better leverage the impact of attendance and participation at key industry events...

Comments  (0)


Hacking-Kung Fu: Aims and Objectives Part 2

May 06, 2012 Added by:Quintius Walker

A major aim of Kung-Fu Hacking training is System Security - or more so being able to secure your own systems. This ability to defend ourselves is a general asset, and has long-term benefits as more and more vulnerabilities become exploitable to the general public...

Comments  (3)

Page « < 3 - 4 - 5 - 6 - 7 > »