Items Tagged with "Security Audits"


6d117b57d55f63febe392e40a478011f

Seminar to Feature ISECOM's OSSTMM v3

October 13, 2010 Added by:Anthony M. Freed

The OSSTMM is a peer-reviewed methodology for performing security tests and metrics divided into five channels: information and data controls, fraud and social engineering, computer and telecommunications networks, wireless devices, physical security access controls, and security processes...

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

CEE Architecture Overview Finally Released

August 31, 2010 Added by:Anton Chuvakin

The future of logging is finally here! Common Event Expression team released the CEE Architecture Overview for public comments. HUGE thanks to MITRE side of team for finally clearing all the hurdles and releasing our baby...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

An Introduction to OSSTMM Version 3

July 15, 2010 Added by:Infosec Island Admin

As a security consultant, I've always looked for ways to increase consistency, efficiency and value when conducting security analysis on a client's network or business. With the impending release of OSSTMMv3 I'll share my thoughts on the success of the model...

Comments  (19)

F8f122d50eba11c3af5607575b277bc6

Embracing a Security Audit

June 21, 2010 Added by:Bryan Miller

In the April 2004 edition of Information Security magazine, George Wrenn writes about "Surviving an Audit". In the article he gives advice from a client's perspective on how to best work with an auditing team, whether the team is internally or externally based. Mr. Wrenn provides many good tips on how to gain the most benefit from a security audit, and most important on what to do after ...

Comments  (2)

Page « < 4 - 5 - 6 - 7 - 8 > »