What’s the biggest problem in computer security, according to valsmith at carnal0wnage.attackresearch.com? Well, it’s…
Staffing.
As the author admits, the post leans toward self-promotion of the company, but it makes many good points and deserves a read and a good pondering.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Security
Tagged as analyst, big 4, budget, certification, cisa, CISSP, compliance, computer, consultants, CPEs, data mining, demand, documentation, exam, exploit, IS, little 4, lone ranger, management, penetration, problem, sans, Security, skills, sox, supply, valsmith
Lenny Zeltser not only created some great security cheatsheets, he compiled a list of some good reference guides developed by others.
Why should you trust his FREE cheatsheets? Lenny leads a security consulting practice, teaches malware analysis, explores security topics at conferences and in articles, and volunteers as an incident handler at the Internet Storm Center.
So whether you want to learn more about specific security practices or just have a quick reference, you’ll want these cheatsheets.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Free, How to..., Security
Tagged as cheatsheet, checklist, command line, DDOS, developers, Ed Skoudis, google hacking, history of technology, incident response, jeremy stretch, lenny zeltser, log review, malware, netcat, owasp, reverse-engineering, sans, Security, sql injection, tcpdump
I ran across Tom Olzak’s post where he quotes from an SANS article by Daniel Wesemann, Password rules: Change them every 25 years. I disagree with both of them on a few points.
First, Olzak notes in his introductory paragraph that
Continue reading →
Like this:
Like Loading...
Filed under Security
Tagged as 30 60 90, brute force, change, complex, daniel wesemann, encrypted, hashed, keylogger, passphrase, password, phishing, sans, sharing, shoulder surf, social engineering, strong, tom olzak, two-factor, write down
Since I started Quote of the Weak, I haven’t heard that many good quotes we can share a chuckle over. So, in contrast, here’s a great quote of the strong:
Continue reading →
Like this:
Like Loading...
When I joined LinkedIn, it was because it was BUSINESS-like and so un-Facebook. As much as I like LinkedIn, it is becoming too much like Twitter and Facebook. Or perhaps it is more accurate to say that LinkedIn features are being used in the same casual manner.
Continue reading →
Like this:
Like Loading...
Filed under Security
Tagged as Facebook, get-out-of-jail, GOOJ, gps, lenny zeltser, linkedin, location, my travel, network updates, out of town, sans, stalking, tracking, tweets, Twitter
Lenny Zeltser, of the SANS Internet Storm Center, posted his Three Laws of Behavior Dynamics for Information Security. These laws describe why people follow or don’t follow new security initiatives. Basically, it describes how people react to change overall, but Zeltser focuses on security change specifically.
Continue reading →
Like this:
Like Loading...
Filed under Security
Tagged as 3 laws, behavior dynamics, handler's diary, information security, internet, internet storm center, lenny zeltser, policy, resistance, sans, Security, status quo, threat level, vendor updates, vulnerability