Building a successful audit analytics program is like climbing a staircase.
The staircase is a set of steps that consist of several items having increasing levels of maturity.
The staircase steps not only help you build your program, but enable you to measure that maturity.
As you view the staircase graphic, mentally insert the word “analytics” before each step.
Continue reading →
Like this:
Like Loading...
Filed under ACL, Audit, Data Analytics, How to..., Technology, Written by Skyyler
Tagged as acl, addin, alignment, analytic, Audit, automate, BI, chart, company, data, database, descriptive, diagnostic, download, education, engagement, enterprise, excel, Fuzzy Lookup, graphic, hardware, high risk, maturity, measure, menu, model, perform, pivot, power, predictive, prescriptive, program, query, software, staircase, strategic, tools, training, view, visual, visualization
Shon Harris is offering FREE Certified Ethical Hacking (CEH) videos for online viewing. According to Harris, all the videos together are over 25 hours long.
The videos are listed below and can be viewed at www.logicalsecurity.com/resources/resources_videos.html.
So what’s the catch? Make sure you read this entire post before you leap!
Like this:
Like Loading...
Filed under Audit, Free, How to..., Security
Tagged as botnet, CEH, dos, firewall, free, hacking, honeypot, ids, pentest, rootkit, scanning, shon harris, sniffer, teach yoursef, tools, trojan, Unix, video, Windows
Did you know that it’s Internal Auditing Awareness Month? More importantly, do you care?
If so, check out this IIA website for ideas, tools, and resources for promoting an internal audit group near you.
Continue reading →
Like this:
Like Loading...
[ W A R N I N G :Â The following links are often categorized by web filters as Hacking links, but only because the tools on this website are used by crackers as well as auditors and security analysts. This is a safe website, but the “watchers” at your workplace or school may not agree – BEWARE.]
UPDATE: The results of the new survey have been released...
SecTools.org is running their every-few-years survey that will “guide Nmap development and also enable a brand new and much-improved overhaul of SecTools.Org.”
Continue reading →
Like this:
Like Loading...
I was at Menards getting ready for my new garden (see my other Menards adventure). As I was checking out, the cashier scanned a blueberry plant that was packaged in a large paper cup, with a small cluster of leaves poking out the top.
Continue reading →
Like this:
Like Loading...
If you’re a blogger, have you saved your blog lately?
WordPress makes it easy. Here’s how to do it if you have a free blog:
Continue reading →
Like this:
Like Loading...
If you probe networks, systems, and applications, you need a GOOJ card to protect yourself and your job.
In How to Stay Out of Jail, I recommended that anyone who scans, probes, or pokes networks, systems, or devices should always carry a get-out-of-jail (GOOJ) card. I also provided some reasons why such a card is critical.
Continue reading →
Like this:
Like Loading...
Filed under Audit, How to..., Security, Technology
Tagged as administrative access, application, audit committee, configuration, cracking, dumpster diving, encryption, exploits, forced entry, GOOJ, impersonation, investigations, logging, monitoring, network, probe, scanner, Security, sniffer, social engineering, system, tools, vulnerabilities, weaknesses
If you work in information security or IT audit (and I don’t mean IT SOX audit), I’d advise you to carry a “get-out-of-jail” (GOOJ) card at all times. In short, get permission before you do your dirty work.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Security
Tagged as assessment, dumpster diving, get-out-of-jail, GOOJ, hacking, pentesting, scanning, security configuration, sql injection, stay out of jail, tools, vulnerability