General security March 21, 2012 Tim Heard CISO Interview Series – Michael Peters Profile Subject: Michael Peters Michael Peters has been an independent information security consultant, executive, researcher and author, with more than 25...
General security February 22, 2012 Azim Poonawala The Enderground: The Last Meeting – Chapter One The sharp short sound of a black agent hibernating his Laptop's OS echoed in the room. The box banged shut making the screen and the keypad kiss each other....
General security December 8, 2011 Hari Krishnan VLAN hacking In Virtual LAN or VLAN is a group of hosts communicate with each other, even thoughthey are in different physical location. Virtual LAN provides location independence...
General security November 24, 2011 Len Marzigliano C&A: The Square Peg This C&A related call for help is from Latonya in Washington, DC: Need help! I am desperately searching for an instruction that will exempt a legacy fielded...
General security November 3, 2011 Ian Palmer Confident KillSwitch Helps Combat Brute-Force Attacks Confident Technologies Inc.'s (CTI) KillSwitch collects data on hacking attempts to help information security (IS) professionals safeguard their companies'...
General security October 24, 2011 Infosec A history of anonymous Anonymous is the most famous 'hacktivist' group in the world. The informal nature of the group makes its mechanics difficult to define. Subsequently, without...
General security October 18, 2011 Infosec Cracking Democracy – Hacking Electronic Voting Machines Communications around the world are gradually going digital. I was born in 1984. I would expect, if I entered a typical office workplace that year, to find...
General security August 5, 2011 Walter Goulet Understanding the Public Key Infrastructure behind SSL secured websites Synopsis: Public Key Infrastructure (PKI) has recently been the focus of several important discussions within the information security community due to high...
General security July 28, 2011 Tom Olzak Five Steps to Incident Management in a Virtualized Environment Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps...
General security June 23, 2011 Brian Greenberg Are your backup systems secure? All seemed well with backup operations at my company, until I got a visit from an operations center engineer. The lock already hanging open, he was holding...