Items Tagged with "Information Security"


Bd07d58f0d31d48d3764821d109bf165

Your Organizational Chart Tells a Security Story

August 28, 2012 Added by:Tripwire Inc

The common reason to push the security team over to the side or down the org chart is due to a belief that what they do isn’t a core value proposition for the company. By reinforcing the idea that security is low priority it creates impediments for the business and the security team to negotiate risk and work collaboratively...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Throwing Stones in Glass Houses: Views on the Security Industry

August 26, 2012 Added by:Rafal Los

The Information Security industry is rife with negativity. Why are we so quick to pile on to others' pain? Isn the security community just more cynical by nature, is it psychological? Are we wired this way? As an industry, our goal is to create more resilient, more secure' and more defensible postures for everyone...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

On Infosec Friends

August 24, 2012 Added by:Javvad Malik

They are the guys who you look out for and they look out for you. If you see a bug in their code, you’ll sort it out for them. When they call you up at 3am for help with a security strategy presentation, you stay up with them all night working on it. When you are stuck on something, you’ll turn to them for help....

Comments  (5)

B8db824b8b275afb1f4160f03cd3f733

Marketing to the Cynical, Skeptical, and Jaded

August 24, 2012 Added by:Jack Daniel

Words like engagement and community are overused by charlatans, marketing gurus, and social media experts- but if you cut the crap and actually engage the community, people will pay attention. Influencer is another abused term, but some people have more of a voice in the community than others. Ignoring people who aren’t ready to buy could be a very bad idea...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Scot Terban ISC2 Board Candidacy

August 23, 2012 Added by:Infosec Island Admin

Ok, so after a flurry of tweets about the candidacy of others, my name got thrown in there like so much pasta being chucked at a wall. Well, it stuck in my case and I decided to run. So, if you think that I can get in there and stir up some trouble, and maybe make some changes then VOTE FOR ME in this petition...

Comments  (0)

Ff632049ba1218ecd55b8122b2112642

Infosec: Be All You Can Be

August 22, 2012 Added by:Randall Frietzsche

So what is an Infosec professional? Like the Samurai we're really warriors, we're soldiers in a battle of good vs. not-so-good. We craft our skills, we increase our knowledge, we strive to be better than those who might do our Enterprises harm, breach our castle walls and loot our treasures of data and services...

Comments  (7)

7fef78c47060974e0b8392e305f0daf0

Sign Dave Lewis' Petition for the ISC2 Board Election

August 22, 2012 Added by:Infosec Island Admin

Dave Lewis wants to work to restore the CISSP exam and it’s place in the community as something to be respected, help bring the ISC2 into the wider acceptance, help make it a force for positive change, and ensure that the ISC2 is representative and accountable to it’s membership...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Defining One Successful Strategy for Enterprise Security

August 20, 2012 Added by:Rafal Los

In far too many organizations leaders and practitioners tell me that the role of Information Security is to protect the organization. Accepting this thinking got us into the predicament where are today, where security isn't everyone's job and only Infosec is thinking about security. This couldn't be more wrong...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

The BSides Las Vegas Innovation Challenge

August 16, 2012 Added by:Security BSides

It’s time to revive this tradition and bring it to the modern day security conference. From an open call to the world, twelve teams representing hackerspaces and maker groups will be selected to come to Las Vegas to compete in four categories in front of a panel of judges to demonstrate what they have accomplished...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

On Secploitation...

August 14, 2012 Added by:Javvad Malik

To honour the new found love-affair the media has with security, I predict Hollywood will jump on the Secploitation bandwagon, so I’ve done the hard work and come up with some sample titles. If you’re a producer or director and need scripts, get your people to give my people a call. We can work something out...

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

BlackHat 2012: Dwayne Melancon Key Takeaways

August 13, 2012

Melancon notes a key finding that “Hackers are always looking for outliers…and the key is to have a way to evaluate your systems and security posture continuously and be able to react pretty quickly.” What else can businesses learn from hackers? Check out this video to find out...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

The Rise of the Virtual-Plagiarist

August 13, 2012 Added by:Ben Rothke

Amazon is a prime feeding ground for the virtual-plagiarist given that Amazon makes a profit off everything sold, and they have no incentive to stop such practices as it would affect their profitability. Amazon takes a kid-gloves approach to plagiarism. That is all the more true for virtual-plagiarized text...

Comments  (3)

C787d4daae33f0e155e00c614f07b0ee

What Information Security Can Learn from Waiting Tables

August 12, 2012 Added by:Robb Reck

What makes an organization effective is in knowing what their customer-base needs or wants. We are only as valuable as the service we give to our customers. For many of us, our primary customers are internal. The business leaders, the IT department, our vendors, and many others are the customers who are served...

Comments  (0)

8e6e3972318ff74b194801340248199e

Security Information Addict

August 12, 2012 Added by:Scott Thomas

Part of the infosec profession is staying abreast of news and events. You need to know what attacks are going on in order to know how to defend against them. The problem with this is that it consumes all your free time. What you start to realize though, is you become addicted to information overload...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Online Threats That Will Throw You Off the Security Balance Beam

August 09, 2012 Added by:Kelly Colgan

We can’t sugarcoat it, because there’s more at stake for online users than going for gold or settling for silver. One blip on the beam or pratfall on the pommel can make a bank-account balance drop faster than an icy judge’s score. And it’ll take more than a Wheaties box to build it back...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Infosec Fill-in-the-Blank: Security BSides Las Vegas Edition

August 08, 2012 Added by:Tripwire Inc

The hardest part about security is...? Security BSides Las Vegas attendees finished the sentence, and Infosec Island‘s Anthony M. Freed caught them on camera. The responses range from insightful to geeky, depressing to funny, and some are harsh, some others pragmatic, but all are quite sage...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »