Network->General
Utilizing Network Security Solutions: A Customer’s Perspective
August 16, 2012
Anyone can go research IT companies and make decisions based solely on what they read, but this is not how people make decisions. People interested in buying a product or service want to know if it will work, how well it has worked in the past, and if current customers are happy with the product or service...
Comments (0)
Translating Security for the Non-Technical Folks
August 15, 2012
To provide more effective data protection that combines preventive and detective controls, a security admin can obtain the necessary technical information to create reports and dashboards that translate data into terms the business understands to make information security visible, measurable and accountable...
Comments (0)
BlackHat 2012: Dwayne Melancon Key Takeaways
August 13, 2012
Melancon notes a key finding that “Hackers are always looking for outliers…and the key is to have a way to evaluate your systems and security posture continuously and be able to react pretty quickly.” What else can businesses learn from hackers? Check out this video to find out...
Comments (0)
When to Strike Back: Mitigative and Retributive Counterstriking
August 10, 2012
Our information and cyber security perimeters and infrastructures are battered daily by scores of probes, scans, and attacks. We stand in defensive posture ducking, bobbing and weaving as we try to avoid the offensive onslaught. It is a losing proposition. Isn't it time we started striking back?
Comments (0)
BlackHat 2012: Alexander Polyakov on New SAP Vulnerabilities
August 01, 2012
Alexander Polyakov describes a recently discovered and widespread architectural vulnerability which especially targets SAP applications and allows for the bypassing of SAP security restrictions, such as firewalls, even in secure landscapes...
Comments (0)
Josh Corman and Jericho Discuss Building a Better Anonymous
August 01, 2012
Josh Corman and Attrition.org's Jericho took some time out at BSidesLV to discuss their article series titled "Building a Better Anonymous" which examined the rogue movement's pros and cons, successes and failure, the group's caricature in the media, and the movement's future...
Comments (0)
BlackHat 2012: Howard Schmidt on Public-Private Partnership
July 31, 2012
Former White House Cybersecurity Coordinator Howard Schmidt offers his opinions on the issues surrounding the strengthening of the relationship between government and the private sector, as well as the urgent need for the passage of effective cybersecurity legislation...
Comments (0)
BlackHat 2012: Dave Porcello Discusses the Power Pwn
July 30, 2012
Dave Porcello, Founder and CEO of Pwnie Express discusses the recently released Power Pwn, a fully-integrated enterprise-class penetration testing platform, covering the entire spectrum of a full-scale pentesting engagement, from the physical-layer to the application-layer...
Comments (0)
Security Slide Rules - The Video...
July 24, 2012
I read this blog post on Slide Rules by Wendy Nather and immediately dropped her a note asking for permission to convert it into a video. After a huge battle with 20th Century Fox over rights to film I won... well at least that’s how I imagine it to have happened...
Comments (0)
How to Deal with a Security Incident
June 01, 2012
"Incidents are bound to happen, there's no avoiding it!" Brian Honan, internationally recognized information security expert, offers tips on how to respond to security incidents...
Comments (1)
On Proper System Hardening
May 16, 2012
When a system or device has been properly hardened, all unnecessary bells and whistles are turned off, disabled, or simply ripped out, leaving only the bare minimum needed to run the service. This creates a much smaller surface area to attack...
Comments (0)
ISA President Larry Clinton Discusses Cybersecurity Legislation
May 07, 2012
Private sector advocates such as Clinton believe some of the current legislation under consideration is far too punitive in nature, and would disincentivize companies from both investing in better security measures and from disclosing data loss events...
Comments (0)
Using Interface Devices for Network Penetration Testing
April 26, 2012
Javvad Malik caught up with Nikhil Mittal at Black Hat Europe 2012 to talk about some human interface technology and their use in network penetration testing. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...
Comments (0)
The Future of Network Security, SSL, and Certificate Authorities
April 25, 2012
Infosec Island's Javvad Malik caught up with Tom Ritter at Black Hat Europe 2012 to discuss the future of network security, SSL, Certificate Authorities and all kinds of security goodness. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...
Comments (0)
Javvad Malik Interviews Don Bailey at Black Hat EU 2012
April 24, 2012
Javvad Malik caught up with Don Bailey at Black Hat Europe 2012 to hear about machine to machine technology and the security challenges it brings. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...
Comments (0)
Javvad Malik on Hacking Tools and Ethics
April 20, 2012
Joshua Corman wrote a post in which he raises some valid points about tools like Metasploit. Naturally, the purpose such tools is to aid a security tester in finding vulnerabilities. However you cannot dictate if someone will use this for attack or defensive purposes...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization