Security Awareness
Growth as a Process
December 09, 2009 Added by:Bill Wildprett, CISSP, CISA
It’s a great time to be a security professional, always so much to keep learning and to do! I’ve been working on personal and professional growth, looking for ways to define myself as a consultant and differentiate myself from the ‘Big Guys’.
Comments (0)
Facebook Application and Content Creation Privacy
December 04, 2009 Added by:Todd Zebert
While Take Control of your Facebook Security & Privacy Settings (part 1 of this series) provided an overview of Application Privacy, this is a deeper dive and explains how Built-in Apps control some basic functions and default security of Facebook. This is the third in a series, the previous being Facebook Privacy using Friend Lists.
Comments (1)
Facebook Privacy using Friend Lists
December 04, 2009 Added by:Todd Zebert
While Facebook’s Privacy settings are a powerful method of controlling who sees what kind of information about you, unless you create and maintain Friend Lists, you are effectively limited to all Friends seeing everything.
Comments (1)
Adding new blades to your personal Swiss Army Knife
December 04, 2009 Added by:Bill Wildprett, CISSP, CISA
Friends of mine had been recommending I learn more about IT auditing, to gain a better perspective on how controls are applied, and why. To that end, I took a three-day Certified Information Systems Auditor (CISA) training course from CertTest in early November.
Comments (0)
Why Infosec Languishes, Part II
October 28, 2009 Added by:Jim Anderson
Although external forces including economic downturn and market specific slowdowns do have their impact, these external forces alone often cannot explain why information security makes so little progress. This phenomenon is often true even in situations where senior infosec leadership is experienced, holds multiple certifications, and otherwise commands an excellent grasp of the multip...
Comments (0)
Anti-Social Networking Sites: Part 2
October 09, 2009 Added by:Ron Lepofsky
Since the last blog there has been a steady stream of news about more security threats originating at web sites, particularly from social networking sites. Profit motive appears to be the primary intent of the threats. The methodology is committing identity theft for profit. Below are a sample of four web based news articles to which I refer:
Comments (0)
Anti-Social Networking Sites
October 09, 2009 Added by:Ron Lepofsky
Over the last two weeks security news reports identify social networking sites as distribution points for malware of all sorts and flavours and as botnets for distributing more of the same. In addition, site users seem enthusiastic to reveal personal information to those who would gladly accept the information for purposes of identity theft
Comments (1)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization