infosec2.wordpress.com
InfoSec 2.0 | Information Security – it’s a people thingInformation Security - it's a people thing
http://infosec2.wordpress.com/
Information Security - it's a people thing
http://infosec2.wordpress.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Sunday
LOAD TIME
0.3 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
4
SSL
EXTERNAL LINKS
11
SITE IP
192.0.78.12
LOAD TIME
0.263 sec
SCORE
6.2
InfoSec 2.0 | Information Security – it’s a people thing | infosec2.wordpress.com Reviews
https://infosec2.wordpress.com
Information Security - it's a people thing
Three simple rules of good security… | InfoSec 2.0
https://infosec2.wordpress.com/2010/08/06/three-simple-rules-of-good-security
Information Security – it’s a people thing. Laquo; Security Awareness Series: Part Four Leveraging Corporate Culture. Security Awareness Series: Part Five Map it Out. Three simple rules of good security…. August 6, 2010. I’ve been taking a look at internetevolution. One of his slides is particularly useful. Titled ‘Three simple rules of good security’ it listed:. Secure networks assume that hosts are hostile. Secure hosts assume the network is hostile. Secure applications assume the user is hostile.
Security Awareness Series: Part Three – Choosing Topics | InfoSec 2.0
https://infosec2.wordpress.com/2010/07/29/security-awareness-series-part-three-–-choosing-topics
Information Security – it’s a people thing. Laquo; Security Awareness Series: Part Two – Setting Goals for Your Awareness Program. Security Awareness Series: Part Four Leveraging Corporate Culture. Security Awareness Series: Part Three – Choosing Topics. July 29, 2010. If you and I were to each list ten awareness topics on separate pieces of paper chances are most of those would be the same. To illustrate, grab a piece of paper and list ten topics. Then continue reading. People need reminding. ItR...
Security Awareness Series: Part Four – Leveraging Corporate Culture | InfoSec 2.0
https://infosec2.wordpress.com/2010/08/05/security-awareness-series-part-four-–-leveraging-corporate-culture
Information Security – it’s a people thing. Laquo; Security Awareness Series: Part Three – Choosing Topics. Three simple rules of good security…. Security Awareness Series: Part Four Leveraging Corporate Culture. August 5, 2010. Want to create a culture of security? People in the security industry are by and large clever and resourceful. But we’re not organisational culture change experts. If you think you are, then take a look at the Wikipedia. A culturally specific awareness poster? Your organisation a...
Security Awareness Series: Part Five – Map it Out | InfoSec 2.0
https://infosec2.wordpress.com/2010/08/09/security-awareness-series-part-five-–-map-it-out
Information Security – it’s a people thing. Laquo; Three simple rules of good security…. This blog has moved…. Security Awareness Series: Part Five Map it Out. August 9, 2010. Now that we have some topics and some goals in mind we can start mapping out a time line for the first 12 months or so of our awareness program. Plus, unless it’s something quite special, most of the participants will forget 80% of what they saw or heard within a couple of days, especially with so many topics. It means that the pro...
TOTAL PAGES IN THIS WEBSITE
4
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: Snail Mail
http://maximuscomputersecurity.blogspot.com/2010/09/snail-mail.html
Computer Security for Normal People. Saturday, September 11, 2010. Not all attacks are high tech cyber crimes that require a high degree of technical skills. Some attacks can be pulled off with rather unsophisticated means. Here’s an example of such an attack:. Lessons to be taken away from this scam. Verify any number you call with a legitimate source (website, prior bill, back of credit card) Don’t trust, Verify! Get to know a bank employee at a local branch and call them with any questions you may have.
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: Hardware Malware
http://maximuscomputersecurity.blogspot.com/2010/09/hardware-malware.html
Computer Security for Normal People. Saturday, September 11, 2010. Imagine buying a new shiny toy, taking it out the package, plugging it into your computer and then having your anti-virus catch a virus on it (you do have anti-virus right? Better quality assurance measures at the manufactures are the only way to stop this problem, however, since it is unlikely the malware is new, anti-virus should have definitions to block it. A few quick tips to protect you. Subscribe to: Post Comments (Atom).
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: Telephony Denial of Service
http://maximuscomputersecurity.blogspot.com/2010/09/telephony-denial-of-service.html
Computer Security for Normal People. Saturday, September 11, 2010. Telephony Denial of Service. Everyone has heard of denial of service (DoS) attacks. These attacks are well publicized when they bring down a large corporation or website such as Yahoo. However, a new twist on this attack has been occurring; telephony DoS attacks against individuals. Here’s how it works. To mitigate this attack, AT&T offered this advice: “We urge anyone who suspects they may be the target of a TDOS attack to immediat...
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: September 2010
http://maximuscomputersecurity.blogspot.com/2010_09_01_archive.html
Computer Security for Normal People. Friday, September 24, 2010. I wouldn't be surprised as security researchers spend more time reverse enginering the malware that they keep finding more nuances that haven't seen before in malware. The sophistication of the malware leads researchers to believe it was created by a government or a highly, highly organized, well-funded group. My only hope is the US created it, if not, we need to develop these capabilities in a hurry. Saturday, September 11, 2010. Couldn...
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: AT&T iPad Breach
http://maximuscomputersecurity.blogspot.com/2010/09/at-ipad-breach.html
Computer Security for Normal People. Saturday, September 11, 2010. I’m sure many of you are aware of the latest high profile loss of personal data. AT&T exposed 114,000 e-mail addresses including some high profile figures such as NYC Mayor Michael Bloomberg. Imagine an e-mail coming from Apple that says go to this website to update your account with SIM card number XYZ. You check and it’s the right number so you have to believe it is legitimate right? All information is important. There was an error in t...
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: Weaponized Malware
http://maximuscomputersecurity.blogspot.com/2010/09/weaponized-malware.html
Computer Security for Normal People. Friday, September 24, 2010. I wouldn't be surprised as security researchers spend more time reverse enginering the malware that they keep finding more nuances that haven't seen before in malware. The sophistication of the malware leads researchers to believe it was created by a government or a highly, highly organized, well-funded group. My only hope is the US created it, if not, we need to develop these capabilities in a hurry. Subscribe to: Post Comments (Atom).
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: First Post
http://maximuscomputersecurity.blogspot.com/2010/08/first-post.html
Computer Security for Normal People. Wednesday, August 4, 2010. In the next few days, I will be posting articles I have already written so look for a bunch of content coming to the blog. If you have topics in particular you would like to learn more about let me know. Take care for now. Subscribe to: Post Comments (Atom). There was an error in this gadget. There was an error in this gadget. I know where you live! CYBER ARMS - Computer Security. San Diego, CA. Certifications: CISSP, GCIH, Security , Network.
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: August 2010
http://maximuscomputersecurity.blogspot.com/2010_08_01_archive.html
Computer Security for Normal People. Thursday, August 19, 2010. I know where you live! Imagine posting a picture of a car you are trying to sell on Craigslist taken with your smartphone. Someone downloads the photo, extracts the lat and long from the picture and then e-mails you asking if anyone is available at 10am on Wednesday to take a look at the car. You would obviously respond, no, everyone is at work! Wednesday, August 4, 2010. In the next few days, I will be posting articles I have already writte...
maximuscomputersecurity.blogspot.com
Computer Security for Normal People: I know where you live!
http://maximuscomputersecurity.blogspot.com/2010/08/i-know-where-you-live.html
Computer Security for Normal People. Thursday, August 19, 2010. I know where you live! Imagine posting a picture of a car you are trying to sell on Craigslist taken with your smartphone. Someone downloads the photo, extracts the lat and long from the picture and then e-mails you asking if anyone is available at 10am on Wednesday to take a look at the car. You would obviously respond, no, everyone is at work! Subscribe to: Post Comments (Atom). There was an error in this gadget. I know where you live!
TOTAL LINKS TO THIS WEBSITE
11
InfoSec 101
Infosec 101 - Computer Security, Electronics, Malware Analysis, Exploit Analysis, Hardware, Rootkits, Penetration Testing and the lastest News. View my complete profile. Australian Security and Privacy. Infosec 101 Site Feed. Google Indexing EXE files. News: Firefox 1.5.0.4 Released. News: Microsoft mhtml: URI Buffer Overflow Vulnera. Next Gen Kernel Object Hooking Rootkits. Article: Non eXecutable Stack Lovin on OSX86. News: Spammers stop Blue Security. Hardware: Xbox 360 DVD Firmware Hack. The Mozilla ...
infosec101.net - Registered at Namecheap.com
This domain is registered at Namecheap. This domain was recently registered at Namecheap. Please check back later! This domain is registered at Namecheap. This domain was recently registered at Namecheap. Please check back later! The Sponsored Listings displayed above are served automatically by a third party. Neither Parkingcrew nor the domain owner maintain any relationship with the advertisers.
..
Commonly Accepted Security Practices and Recommendations. Ecommendations. Our goal is to distill the knowledge of the world’s Information Security experts into a series of papers that are freely available on the Internet to everyone. Using the OpenSource movement as a guide, the papers will be developed and released under the GNU Free Document License. To make sure that they and any derivates remain freely available. We need your help! It is as simple as filling out a form. 2003 CASPR Working Group.
Information Security & Ethical Hacking | Information Security Hints
Information Security and Ethical Hacking. September 7, 2011. This blog has been moved to www.InfoSecSolution.com. OWASP – The Open Web Application Security Project. March 18, 2011. The OWASP Top 10 Web Application Security Risks for 2010 are:. A2: Cross-Site Scripting (XSS). A3: Broken Authentication and Session Management. A4: Insecure Direct Object References. A5: Cross-Site Request Forgery (CSRF). A7: Insecure Cryptographic Storage. A8: Failure to Restrict URL Access. March 17, 2011. First use the uns...
InfoSec 2.0 | Information Security – it’s a people thing
Information Security – it’s a people thing. This blog has moved…. October 28, 2010. WordPress was a great way to get in to blogging. One day I’ll probably run it on my own site which is where this blog is now hosted. Security Awareness Series: Part Five Map it Out. August 9, 2010. Now that we have some topics and some goals in mind we can start mapping out a time line for the first 12 months or so of our awareness program. Assuming you did watch it, now I’m going to stretch you even further and ask that ...
Greg Martin's blog - InfoSecurity 2.0
Greg Martin's blog - InfoSecurity 2.0. Threat Research, Trending and analysis for normal humans. Wednesday, March 27, 2013. Big Data Security Analytics. If your an XYZ SIEM user today and your boss is asking you about big data what is our strategy. You probably have RSA, HP and everyone trying to pitch you their new product which solves all problems. Here is what you need to be doing to start migrating from just SIEM correlation to big data security analytics:. Download and install Elastic Search. Http:/...
InfoSec 2012
התחבר / הירשם למערכת. ראשון, 24 ביוני 2012. David InterContinental, Tel Aviv, Israel. ענייני CYBER במגזר הפיננסי. שותף, מנהל SECOZ - מרכז הגנת הסייבר, BDO, יו"ר ועדת התכנים. Cyber Security - מציאות או דמיון? בעידן הנוכחי בו אנו שומעים חדשות לבקרים על מתקפות סייבר, גניבות מידע וזהות, האתגר האמיתי העומד בפני מנהלי מערכות המידע והממונים על הביטחון, עודנו ההגנה הארגונית על משאבי המידע ונכסי הידע. אורן ברט, מנהל תחום. (קרא עוד). מנהל תחום אבטחת מידע. Advance Protection against Advanced Threats. מהפכת המובייל ...
InfoSec2013
התחבר / הירשם למערכת. כנס קודם - InfoSec2012. רביעי, 8 במאי 2013. Avenue Convention Center, Airport City, Israel.
SOCIAL ENGAGEMENT