Sans- How Not To Fail at a Pen Test
One of the best Sans webinars I have seen in a long time. Thank you Ed and John for putting together such a comprehensive presentation. Read More
One of the best Sans webinars I have seen in a long time. Thank you Ed and John for putting together such a comprehensive presentation. Read More
Please take time to read this insightful publication by David Emm, Roman Unuchek, Victor Chebyshev, Maria Garnaeva and Denis Makrushin from Kaspersky Labs. The publication offers unparalleled insight and examples of current evolving threats through the info sec lens. Click to Download
Despite numerous public takedowns, cyber criminals will continue to extort users by leveraging their own data as ransom.Click Here for Original Post
According to the study by ISACA, 15% of companies are prepared, or feel prepared to handle APT’s. Download Report Here
Good presentation from Bit9 on using sandboxing to potentially identify APT’s. Click Here
I recall seeing a NASDAQ trading blackout a few months ago. Although NASDAQ claimed the 4 hour blackout was the result of a high speed trading glitch, it is more probable that these incidents are related given this article. See full article here: http://arstechnica.com/security/2014/07/how-elite-hackers-almost-stole-the-nasdaq/
Microsoft seized over 22 No IP domains under the pretext that they hosted malicious activity. Is this the cost of being in the security business or have they overstepped legal barriers?
Although I may not agree with current policy regarding net neutrality, this op-ed from ArsTechnica conveys an interesting view point that almost persuades one to move away from net neutrality. Unfortunately, the end of net neutrality will mean added costs for sites, email and traffic in general. http://arstechnica.com/tech-policy/2014/06/we-dont-need-net-neutrality-we-need-competition/
SANS is hosting a forensics challenge this evening that reinforces the need for improved forensic reflexes. For example, if you normally do the same actions when confronted with a task, this becomes a form of rapid memory reflexes (RMR). If you have to research information in a book or online, you normally apply external memory reflexes [...]
If you are not familiar with this annual report, please take the time and review the findings from Verizon’s in-depth analysis on data breaches. http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf