Blog Posts Tagged with "Information Security"


On Infosec Friends

August 24, 2012 Added by:Javvad Malik

They are the guys who you look out for and they look out for you. If you see a bug in their code, you’ll sort it out for them. When they call you up at 3am for help with a security strategy presentation, you stay up with them all night working on it. When you are stuck on something, you’ll turn to them for help....

Comments  (5)


Marketing to the Cynical, Skeptical, and Jaded

August 24, 2012 Added by:Jack Daniel

Words like engagement and community are overused by charlatans, marketing gurus, and social media experts- but if you cut the crap and actually engage the community, people will pay attention. Influencer is another abused term, but some people have more of a voice in the community than others. Ignoring people who aren’t ready to buy could be a very bad idea...

Comments  (1)


Scot Terban ISC2 Board Candidacy

August 23, 2012 Added by:Infosec Island Admin

Ok, so after a flurry of tweets about the candidacy of others, my name got thrown in there like so much pasta being chucked at a wall. Well, it stuck in my case and I decided to run. So, if you think that I can get in there and stir up some trouble, and maybe make some changes then VOTE FOR ME in this petition...

Comments  (0)


Infosec: Be All You Can Be

August 22, 2012 Added by:Randall Frietzsche

So what is an Infosec professional? Like the Samurai we're really warriors, we're soldiers in a battle of good vs. not-so-good. We craft our skills, we increase our knowledge, we strive to be better than those who might do our Enterprises harm, breach our castle walls and loot our treasures of data and services...

Comments  (7)


Sign Dave Lewis' Petition for the ISC2 Board Election

August 22, 2012 Added by:Infosec Island Admin

Dave Lewis wants to work to restore the CISSP exam and it’s place in the community as something to be respected, help bring the ISC2 into the wider acceptance, help make it a force for positive change, and ensure that the ISC2 is representative and accountable to it’s membership...

Comments  (1)


Defining One Successful Strategy for Enterprise Security

August 20, 2012 Added by:Rafal Los

In far too many organizations leaders and practitioners tell me that the role of Information Security is to protect the organization. Accepting this thinking got us into the predicament where are today, where security isn't everyone's job and only Infosec is thinking about security. This couldn't be more wrong...

Comments  (0)


The BSides Las Vegas Innovation Challenge

August 16, 2012 Added by:Security BSides

It’s time to revive this tradition and bring it to the modern day security conference. From an open call to the world, twelve teams representing hackerspaces and maker groups will be selected to come to Las Vegas to compete in four categories in front of a panel of judges to demonstrate what they have accomplished...

Comments  (1)


On Secploitation...

August 14, 2012 Added by:Javvad Malik

To honour the new found love-affair the media has with security, I predict Hollywood will jump on the Secploitation bandwagon, so I’ve done the hard work and come up with some sample titles. If you’re a producer or director and need scripts, get your people to give my people a call. We can work something out...

Comments  (1)


The Rise of the Virtual-Plagiarist

August 13, 2012 Added by:Ben Rothke

Amazon is a prime feeding ground for the virtual-plagiarist given that Amazon makes a profit off everything sold, and they have no incentive to stop such practices as it would affect their profitability. Amazon takes a kid-gloves approach to plagiarism. That is all the more true for virtual-plagiarized text...

Comments  (3)


What Information Security Can Learn from Waiting Tables

August 12, 2012 Added by:Robb Reck

What makes an organization effective is in knowing what their customer-base needs or wants. We are only as valuable as the service we give to our customers. For many of us, our primary customers are internal. The business leaders, the IT department, our vendors, and many others are the customers who are served...

Comments  (0)


Security Information Addict

August 12, 2012 Added by:Scott Thomas

Part of the infosec profession is staying abreast of news and events. You need to know what attacks are going on in order to know how to defend against them. The problem with this is that it consumes all your free time. What you start to realize though, is you become addicted to information overload...

Comments  (0)


Online Threats That Will Throw You Off the Security Balance Beam

August 09, 2012 Added by:Kelly Colgan

We can’t sugarcoat it, because there’s more at stake for online users than going for gold or settling for silver. One blip on the beam or pratfall on the pommel can make a bank-account balance drop faster than an icy judge’s score. And it’ll take more than a Wheaties box to build it back...

Comments  (0)


Infosec Fill-in-the-Blank: Security BSides Las Vegas Edition

August 08, 2012 Added by:Tripwire Inc

The hardest part about security is...? Security BSides Las Vegas attendees finished the sentence, and Infosec Island‘s Anthony M. Freed caught them on camera. The responses range from insightful to geeky, depressing to funny, and some are harsh, some others pragmatic, but all are quite sage...

Comments  (0)


On Surviving Black Hat

August 03, 2012 Added by:Tripwire Inc

The sessions felt somewhat lack-luster – a lot of what I was hearing had been said before. Many of the conversations were consistent with other events and the topics felt replayed. The horrifically long coffee queue at Starbucks provided me with time to people watch, so here are my Black Hat 2012 observations...

Comments  (0)


Government Hackers: Party in the NSA

August 02, 2012 Added by:Bill Mathews

General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?

Comments  (0)


How Does Jailbreaking or Rooting Affect Mobile Device Security?

August 01, 2012 Added by:Robert Siciliano

By hacking your device, you can potentially open security holes that may have not been readily apparent, or undermine the device’s built-in security measures. Jailbroken and rooted phones are much more susceptible to viruses and malware...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked