Blog Posts Tagged with "Infosec"


Personal Reflections on Suits and Spooks DC 2013

February 13, 2013 Added by:Jeffrey Carr

Now that I've had a chance to decompress from and reflect upon the terrific Suits and Spooks DC conference last weekend, I want to share some surprising shifts in thinking that occurred for me during those two days.

Comments  (0)


What’s on Your Phone? A Lot More than You Realize

January 31, 2013 Added by:Robert Siciliano

With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC. So if you have a smartphone or tablet, make sure you take steps to protect yourself...

Comments  (0)


Get Your Security BSides On In San Francisco

January 24, 2013 Added by:Security BSides

The goal of Security BSides is to expand the spectrum of conversation beyond the traditional confines of space and time. The conferences create opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration...

Comments  (1)


Cyberpunk and Music, Community Style

January 22, 2013 Added by:Dave Shackleford

Last year, I put out a call to the infosec community on Twitter for some new ideas on electronic music and Sci Fi books in the “cyberpunk” genre. Tons of you responded, and I wanted to capture this in a blog post to share the feedback...

Comments  (0)


Sure, I'll be Your Unicorn

January 21, 2013 Added by:Wendy Nather

I was fascinated to read about the last year cancellation of the British Ruby conference due to the arguments that the speaker lineup lacked diversity. Other people have their own opinions on why we have this problem and what we should do about it...

Comments  (0)


Brand Statements Tell Your InfoSec Story

January 17, 2013 Added by:Steven Fox, CISSP, QSA

Listening to bad brand statements is like sitting through a bad movie or comedy skit. Yes, I am among those who stand politely as a vendor tries to sell me something without bothering to determine what I actually care about. At least I get to learn about bad brand stories...

Comments  (0)


Security Resolutions for the New Year

December 28, 2012 Added by:Allan Pratt, MBA

As the New Year approaches, have you thought about your New Year’s resolutions? As a member of the information security industry, I would like to share five resolutions that you should definitely add to your list...

Comments  (0)


The Obligatory 2013 Infosec Predictions Post

December 26, 2012 Added by:Simon Moffatt

Technology evolves so quickly that 12 weeks is an age when it comes to new ideas and market changes - and security is no different. However, the main areas I will personally be following with interest though, will be the BYOD/BYOA, personnel, preemptive security and social intelligence...

Comments  (0)


The INFOSEC Naughty List 2012: “The Twelve Charlatans of Christmas” Edition

December 12, 2012 Added by:Infosec Island Admin

But seriously folks, this post may be cathartic for me and a chuckle for you, but in reality it will change nothing. The douches will be douchey and the charlatans will sell their cyber snake oils. Enjoy the charlatanism and douchery...

Comments  (0)


Organizational Influence via Security Team Branding

December 09, 2012 Added by:Steven Fox, CISSP, QSA

Hacker Halted 2012 was full of personalities; executives, technologists, students and security enthusiasts – each one with stories that fueled conversations and debate. Technical and business erudition dominated the speaker sessions and the hacking competitions...

Comments  (0)


Security Job Titles

December 04, 2012 Added by:Scott Thomas

You may be listed as the 'Security Guru' in a large company but if all you're doing is making sure everyone is swiping their ID badge as they walk in, it may not be the job for you...

Comments  (0)


Risky Business

December 03, 2012 Added by:Randall Frietzsche

In the broad spectrum of activities which might be called Information Security, we must always first and foremost implement, execute and follow through with risk management. Risk management is the backbone or foundation of any good information security program...

Comments  (0)


Preventative -v- Detective Security

December 02, 2012 Added by:Simon Moffatt

Security has several issues from a proactive implementation perspective. Like anything, a detailed return on investment, including both tangible and non-tangible benefits, is required...

Comments  (0)


Wargames on a New Level - Hackfest.CA in Quebec City

December 02, 2012 Added by:Rafal Los

When I was asked to come out to Quebec for a conference called Hackfest.CA, I was interested because this isn't a conference I had heard of, and it wasn't on my radar. Additionally, the name suggests it's geared towards the 'hackers' and quite frankly, I'm fairly out of practice...

Comments  (0)


Fifteen Tips to Improve Your Infosec Risk Management Practice

November 29, 2012 Added by:Tripwire Inc

For years security vendors have been able to play off the general fears of malware and cyber attacks. As the scope of protecting data has become more complex, we’ve slowly learned that deploying more security controls alone is not a risk management solution...

Comments  (0)


BSidesJackson 2012: A Brand Spanking New Infosec Community

November 27, 2012 Added by:Chris Sistrunk

BSidesJackson was the 1st infosec conference to be held in Mississippi. I organized BSidesJackson because I believe in infosec, and I also believe that having a local infosec community is matter where you work or what type of information/networks you must protect...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »