Blog Posts Tagged with "Security Management"

91648658a3e987ddb81913b06dbdc57a

Hacking Layer 8 - Wetware

July 22, 2010 Added by:Ron Baklarz

One can certainly see this train wreck coming with the potential for company names to be plastered all over the Internet with the embarrassing results of their social engineering-induced data leakage...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

We Need Smarter Security - Not Pricier Security

July 19, 2010 Added by:Global Knowledge

Spending more on security does not always equate to better security. There are plenty of options for companies to consider in order to increase security without spending a fortune...

Comments  (0)

04f75408812398c1b907d10e22aac579

Open Betas for IPD Guides Available for Download

July 18, 2010 Added by:Jay Ferron

The Infrastructure Planning and Design guide for Microsoft Forefront Identity Manager (FIM) 2010 provides actionable guidance for designing a FIM 2010 infrastructure...

Comments  (1)

4e714dc795dc50b932e2a837e3efc472

Configuring Security in Glassfish v3

July 17, 2010 Added by:Joe Morrissey

Configuring a security realm in Glassfish v3 to tie in with your pre-existing MySQL database for user credentials is actually easier than you might think...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

How To Test for DNS Compatibility

July 16, 2010 Added by:Simon Heron

L.ROOT-SERVERS.NET was the first to switch to a signed copy of the root zone and can be used for testing. This version has been configured deliberately so that it cannot be validated. Its purpose is to allow operators to test whether they can receive signed responses cleanly...

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Information Security or IT Security?

July 15, 2010 Added by:Dejan Kosutic

The basic point is this - you might have perfect IT security measures, but only one malicious act done by the administrator can bring the whole IT system down. This risk has nothing to do with computers, it has to do with people, processes, supervision, etc...

Comments  (10)

63b96d79afc327c98a13c614670feca0

Name Servers and DNS Infrastructure

July 15, 2010 Added by:Nathaniel Markowitz

The NS naming structure provides an important insight into how criminal operations attempt to avoid down-time and service interruption. Due to the dubious nature of their activities, such organizations create a redundant infrastructure in order to support their activities...

Comments  (0)

F520f65cba281c31e29c857faa651872

Exploring the CFO's Role in Information Security

July 14, 2010 Added by:Rahul Neel Mani

Whenever there is a crunch, CFOs look at their biggest expenses, and they cut costs. What are the expenses that appear noncore? Advertising, brand building and IT? In reality, IT is actually the function that can help you save across the board...

Comments  (0)

04f75408812398c1b907d10e22aac579

MTA - Microsoft Technology Associate

July 14, 2010 Added by:Jay Ferron

The MTA will offer students a certification in the fundamentals of IT and development. Unlike more advanced Microsoft certifications, the MTA targets students with no prior IT or development experience or employment...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Splunk 4 Users Review

July 12, 2010 Added by:Brent Huston

Splunk is a log collection engine at heart, but it’s really more than that. Think of it as search engine for your IT infrastructure. It will actually collect and index anything you can throw at it, and this is what made me want to explore it...

Comments  (1)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Briefs White House

July 12, 2010 Added by:Marjorie Morgan

ISA was a major participator in the development of the "Cyber Space Policy Review." The very first source cited in the Review is the ISA Social Contract for Cyber Security and the Executive Summary both begins and ends by citing the ISA...

Comments  (0)

4e714dc795dc50b932e2a837e3efc472

CISOs Unable to Quantify Security Controls

July 12, 2010 Added by:Joe Morrissey

The irony is that whilst firms focus on preventing data spills, malicious theft is where the money is. Data security incidents related to accidental losses are unfortunately common, but by comparison with malicious theft, cause little quantifiable direct damage...

Comments  (2)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (003)

July 11, 2010 Added by:Christophe Veltsos

Who said: "The biggest vulnerability we face today and the future is not the thing that the technical security person would think of, like a botnet or technical flaw, but the misperception of risk..."?

Comments  (0)

04f75408812398c1b907d10e22aac579

WhatsUp Gold Engineer's Toolkit

July 09, 2010 Added by:Jay Ferron

As a security profession I am always on the lookout for tools that we help me do easier. Ipswich has just offered a free tool that should be in any Windows administrator took kit...

Comments  (0)

72cc4c5e6cbde70aa374bf94076ad722

Using Information Rights Management to Prevent Snooping by IT Staff

July 09, 2010 Added by:Peter Abatan

In a recent news article a survey carried out by Cyber-Ark global survey claimed that 41% of IT pros admit to snooping on confidential information. Forty-one percent of respondents confessed to abusing administrative passwords to snoop on sensitive or confidential information...

Comments  (5)

D13f77e036666dbd8f93bf5895f47703

Analysis on Defense and Cyber Warfare

July 08, 2010 Added by:Theresa Payton

Cyber war is not limited necessarily just between countries, as Google found out earlier this year. Countries have the ability to attack private companies, which could cause power outages, massive financial theft, or the loss of private information of millions of people...

Comments  (5)

Page « < 1 - 2 - 3 - 4 - 5 > »