christodonte.com
InfoSec | Marcos Christodonte II - Information Security Blog
http://christodonte.com/category/infosec
Enter 468x60 Banner Code Here. Risk-based auditing to achieve enterprise security. April 29, 2010 by Marcos Christodonte II. Middot; Leave a Comment. Here’s a new piece I wrote for SearchSecurity.com on using a risk-based auditing methodology. To achieve enterprise security. Some topics covered include:. Why use a risk-based audit. How to perform a risk assessment. Tips on categorizing assets. Classifying assets by criticality and confidentiality levels. Calculating risk and risk ranking. Give it a read.
2015.swisscyberstorm.com
Program | Swiss Cyber Storm 2015 - International IT Security Conference
http://2015.swisscyberstorm.com/program
President, Swiss Cyber Storm. Security Consultant, Writer, Professional Speaker and Expert Witness, Atlanta, Georgia-based Principle Logic, LLC. Why organizations keep getting breached.Still, in 2015. Director Managed Security Services, terreActive. Vice President and Head of SOC, Coutts and Co Ltd, Zurich. Effective methods to detect current threats. CISO, Publicis Group. Flushing Away Preconceptions of Risk. Threat Intelligence Analyst, Symantec. Supervisory Special Agent, Cyber Division (CYD), FBI.
blog.elcomsoft.com
Did you know that…? « Advanced Password Cracking – Insight
http://blog.elcomsoft.com/category/did-you-know-that
Advanced Password Cracking – Insight. This blog is about cracking passwords. Computer and network security. Archive for the ‘Did you know that…? Laquo; Older Entries. Understanding and Bypassing Reset Protection. Monday, May 16th, 2016. In all new smartphones manufactured after July 1, 2015. Other jurisdictions followed, passing legislations with kill switch requirements to combat smartphone theft. Factory reset protection is a security method designed to make sure your smartphone becomes useless if the ...
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: 5/24/15 - 5/31/15
http://securityonwheels.blogspot.com/2015_05_24_archive.html
You can't secure what you don't acknowledge. Friday, May 29, 2015. What you (really) need to know about esophageal manometry. Aside from my typical computer security-related blog posts I thought I’d branch out and share something completely unrelated in hopes it can benefit others. Up one of your nostrils and all the way down to the entry point of your stomach.a medical procedure undoubtedly similar to pre-1800’s era surgeries: awful, seemingly inhumane, and without anesthesia. Had I known that:. 8226; I...
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: Don't get blinded by the "small stuff" that's hard to notice
http://securityonwheels.blogspot.com/2015/04/dont-get-blinded-by-small-stuff-thats.html
You can't secure what you don't acknowledge. Wednesday, April 15, 2015. Don't get blinded by the "small stuff" that's hard to notice. One of the core challenges you face in information security is getting so caught up in the minutiae of your network environment and day-to-day work that you end up not being able to see the bigger picture: what's really going on, what really needs attention, and what really matters. I've been writing about this for over a decade. And I've yet to stop spreading the word.
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: 3/8/15 - 3/15/15
http://securityonwheels.blogspot.com/2015_03_08_archive.html
You can't secure what you don't acknowledge. Tuesday, March 10, 2015. Using Checkmarx CxSuite to outline "the rest of the story" regarding application security. When it comes to Web application and mobile app security, can you honestly say you know where everything. Stands.as American radio personality Paul Harvey. Used to proclaim - the rest of the story. Note that I emphasize "automated" source analysis because n o security professional of value. There are a dozen more low-priority findings that you ca...
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: 2/8/15 - 2/15/15
http://securityonwheels.blogspot.com/2015_02_08_archive.html
You can't secure what you don't acknowledge. Monday, February 9, 2015. Back to basics in information security? Proven year after year but (apparently) unattainable for many. I'm often wrong about many things in life.just ask my wife. However, I'm feeling a bit vindicated regarding my long-standing approach to information security: address the basics, minimize your risks. The new Online Trust Alliance report found the same things. CyActive had similar findings as well in their new study. Backs up this rea...
snappytitles.com
Keeping Your Data Secure: 101 Tips You Must Know - Resources
http://www.snappytitles.com/KYDS1/index.html
If you would like to be notified when copies of. Keeping Your Data Secure II: The Human Factor. Can be ordered, send an e-mail to:. The online resources for Keeping Your Data Secure: 101 Tips You Must Know. Are now available here. If you would prefer to purchase an e-book version of either book then simply e-mail. Keeping Your Data Secure:. You can listen to a MODEM here. Software to play MP3's is required). You can download the checklist from the book here. You can read more about Risk Management at.
SOCIAL ENGAGEMENT