Management, compliance & auditing June 15, 2011 Kenneth Magee ISO27002 Security Framework – Audit Program Template Several people have asked for an IT Audit Program Template for an audit based on the ISO/IEC 27002:2005(E) security standard. This template, which can be...
Reverse engineering June 13, 2011 Gary Golomb Mutexes, part two: Using WinDbg to Begin Reverse Engineering Unknown Malware from Memory Part Two in a multi-part series on holistic, multi-disciplinary analysis and reversing. You can read part one of this series here. The last post, "Mutex Analysis:...
Reverse engineering June 13, 2011 Gary Golomb Mutexes, part one: The Canary in the Coal Mine and Discovering New Families of Malware Part One in a multi-part series on holistic, multi-disciplinary analysis and reversing. This post is based on a presentation I gave at the last Thotcon, but...
Hacking June 13, 2011 Infosec Val Smith Reveals His Process for Security Research In our ongoing series of interviews, this week Val Smith answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for...
Application security June 8, 2011 Russ McRee OWASP Top 10 Deeper Dive – A8: Failure to Restrict URL Access [highlight color="blue"]Interested in formal OWASP Top 10 Training? Check out our OWASP Top 10 Training course OWASP Top 10 Training. [/highlight] Description:...
Management, compliance & auditing June 2, 2011 Kenneth Magee IT Auditing and Controls – Information Technology Basics Information Technology Basics In its most basic form, information technology (IT), can be reduced down to IPO. No that’s not an Initial Public Offering,...
Hacking June 1, 2011 Infosec Stefan Esser Reveals His Process for Security Research In our ongoing series of interviews, this week Stefan Esser answered a few questions and pulled back the curtain a bit on the methods, tools and motivation...
Application security May 31, 2011 Thomas Mackenzie Web Application Firewalls with Mod Security One of the biggest problems that businesses and individuals face today is the cost of web application security. It is not uncommon in the UK, for example, to...
Management, compliance & auditing May 27, 2011 Kenneth Magee IT auditing and controls – IT governance and controls “IT Governance and Controls” or “IT Monitoring and Assurance Practices for Board and Senior Management” Take your choice of titles of this article,...
Application security May 25, 2011 Tasos Laskos Web application testing with Arachni In very simple terms, Arachni is a tool that allows you to assess the security of web applications. In less simple terms, Arachni is a high-performance,...