Whether you script your projects or use menu commands, you need to review your ACL log carefully.
Good analysts review their results and the log as they work in ACL, after they think they are done, and have others review their log before the ACL project is relied upon.
(You can’t imagine the dumb mistakes my team and I found that saved us a lot of embarrassment later.)
Continue reading →
Like this:
Like Loading...
Filed under ACL, Data Analytics, How to..., Scripting (ACL), Written by Skyyler
Tagged as acl, bypass, check, computed, conditional, conventions, duplicates, ESCAPE, fail, field, first, found, ignore, invalid, log, pause, review, script, second line, test, unable
If you’re looking for a way to safely check URLs for bad content, Lenny Zeltser had a great list of free online tools for you.
Continue reading →
Like this:
Like Loading...
Filed under Free, How to..., Security, Technology
Tagged as check, free, lenny zeltser, malicious, malware, online, safe, tool, URL, website
CSO magazine had a great article some time ago that I came across again entitled, How Not to Hire an Information Security Officer Who’s on Parole. After it describes some true-life hiring horrors, it provides some good points to remember about hiring:
Like this:
Like Loading...
Filed under Audit, Employment, How to..., Security
Tagged as access, background, check, cso, hiring, mistake, parole, policy, request