CCFP (Certified Cyber Forensics Professional) is the only cyber forensics certification that provides a comprehensive validation of your knowledge and skills as a digital forensics expert.
Cryptolocker is a preventable attack with some Security Awareness training.
NIST has released the final version of it's Cyber Security Framework
New federal rule requires banks to fight DDoS attacks
The Administrative Simplification provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA, Title II)
Draft copy of a new book by Peter Gutman on Security Engineering
Hackers exploit vulnerable systems – and unprepared individuals – to access trade and commercial secrets, damage or gain control of national assets of strategic importance, publicly embarrass top brands, and wreak general havoc with considerable financial, social and economic repercussions.
See below a short list of Linux Distribution you can use for Security Testing, Penetration Testing, or other security purpose. As usual, if your preferred distribution is not on the list let me know.
Windows 8.1 claim to stop the Pass-The-Hash attack. Smart Card’s Pass-the-Hash perils does not stop at its false sense of security.
This is Domain 6 of the Security+ CBK. It is 11% of the exam.
This is Domain 5 of the Security+ CBK on Access Control and Identity Management. It is 13% of the exam.
This is Domain 4 of the Security+ CBK. It is covering 10% of the exam.
This is Domain 3 of the CompTIA Security+ CBK. It is 21% of the exam.
This is Domain 2 of the Security+ CBK. This domain is 18% of the exam.
This is the first domain of Security+ and it counts for 21% of the whole exam.
It is the MOST important domain for the exam and you must master it.
This is a thorough introduction to what Security+ is and what is required to become certified.
The Open Source Security Testing Manual from ISECOM. A fantastic project from my friend Pete Herzog. If you believe in true security this is a must know web site and content.
CompTIA has announced the venue of Security+ 401 by the end of the first quarter of 2014.. This article shows the changes that were introduced in the new version of the exam.
Why 9 Steps to Cybersecurity is an Essential Read: Learn how to use risk management to make your cybersecurity a profitable investment. Learn how to comply with various information security laws and regulations, including U.S. Executive Order Improving Critical Infrastructure Cybersecurity.
2013 list of top management and performance challenges facing the Department of Justice (Department)