This posting will give you tips and tricks on how to start your own study group in your area. Group Dynamic is always a great motivator in your studies. You learn from others and others will benefit of your knowledge as well.
Last month, the popular online publication TechDirt published an article based on Golden Frog’s filing with the FCC that urged the commission to truly restore an Open Internet. A key portion of the article focuses on how we noticed that ISPs and wireless broadband providers can block encryption technologies if they desire.
Today is a VERY sad day. I have just learned that my good friend and confident Shon Harris has passed away. The world of information security has just lost a great lady who helped thousands in their career. She was a close friend and I will miss her greatly.
I was busy in class this week and there ware a LOT of articles published about this new bug affecting a lot of systems and devices. See this two minutes video from Norton giving you a great overview of what the attack is all about.
The Critical Security Controls focuses first on prioritizing security functions that are effective against the latest Advanced Targeted Threats, with a strong emphasis on "What Works" - security controls where products, processes, architectures and services are in use that have demonstrated real world effectiveness. The actions defined by the Controls are demonstrably a subset of the comprehensive catalog defined by the National Institute of Standards and Technology (NIST) SP 800-53.
As companies turn to digital technologies for business solutions, the risk of a security breach continues to rise. For the last 11 years, the security of information technology and data has been rated as a top technology initiative in surveys conducted and published by the AICPA.
As digital technology transforms 21st century life, questions about privacy rights abound. The U.S. Supreme Court ruled on one such question in late June: if you are arrested, can the police search your cell phone without first obtaining a warrant?
My friend Sid has some very interesting training for people who wish to learn more about Application Security.
This publication addresses the engineering-driven actions necessary for developing a more defensible and survivable information technology (IT) infrastructure
Secunia’s Vulnerability Intelligence Manager is vulnerability intelligence brought to you on time, every time, by Secunia’s renowned research team
SpiderFoot is an open source footprinting tool, available for Windows and Linux. It is written in Python and provides an easy-to-use GUI. SpiderFoot obtains a wide range of information about a target, such as web servers, netblocks, e-mail addresses and more.
The HHS Office for Civil Rights has settled with two organizations for a combined $1,975,220 penalty after their unencrypted computers were stolen.
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is equipping security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills needed
More than 7,600 different power, chemical and petrochemical plants may still be vulnerable to a handful of SCADA vulnerabilities made public this week.
Draft copy of a new book by Peter Gutman on Security Engineering
Windows 8.1 claim to stop the Pass-The-Hash attack. Smart Card’s Pass-the-Hash perils does not stop at its false sense of security.
This is Domain 6 of the Security+ CBK. It is 11% of the exam.
This is Domain 5 of the Security+ CBK on Access Control and Identity Management. It is 13% of the exam.
This is Domain 4 of the Security+ CBK. It is covering 10% of the exam.