Application security March 30, 2011 Ryan Dewhurst Finding Security Vulnerabilities in PHP Using Grep Description: Using grep to find common web application vulnerabilities within your applications. Introduction It is a common misconception that companies need...
CISA March 29, 2011 Kenneth Magee CISA Domain 3 Information Systems Acquisition, Development and Implementation It's interesting to notice how ISACA is aligning itself with the International Organization of Standards ISO/IEC 27002. The title for Domain 3 is Information...
CISSP March 25, 2011 Kenneth Magee CISSP Domain – Legal, Regulations, Investigations and Compliance There are several topics we need to look at when we discuss the Legal domain of CISSP. First you need some background and a couple of important distinctions: Civil...
Hacking March 25, 2011 Infosec Joanna Rutkowska Reveals Her Process for Security Research In our ongoing series of interviews, Joanna Rutkowska answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the...
General security March 24, 2011 Keatron Evans iPhone Security: 10 Tips and Settings The iPhone is one of the most popular mobile devices on the market with an array of downloadable apps for users to do any number of things. Its popularity and...
CISA March 24, 2011 Kenneth Magee CISA Domain 2 – Governance and Management of IT CISA – Domain 2 – Governance and Management of IT ISACA has revamped the CISA material and this domain now contains the Business Continuity section from...
Digital forensics March 24, 2011 Keatron Evans iPhone Security: iPhone Forensics In this video, we will review the wealth of forensic data stored on an iPhone 3Gs using Paraben's Device Seizure software. The iPhone is one of the most popular...
CISA March 23, 2011 Kenneth Magee CISA – Domain Mapping for 2011 Exam Several of you have been asking for a mapping of the new CISA 5 domains to the previous year's six domains. The new mapping is as follows: The major change...
General security March 22, 2011 Jack Koziol HD Moore Reveals His Process for Security Research In our ongoing series of interviews, we got HD Moore to answer a few questions and pull back the curtain a bit on the methods, tools and motivation for the...
Application security March 21, 2011 Russ McRee OWASP Top 10 Tools and Tactics Description: A tool for each of the OWASP Top 10 to aid in discovering and remediating each of the Top Ten Introduction If you've spent any time defending...