Management, compliance & auditing February 19, 2014 John Fox Top 10 Common Misconceptions About Application Whitelisting Application Whitelisting is a technology that has been in use in the security world for quite a long time. For those who may not already be familiar with AWL,...
Management, compliance & auditing January 2, 2014 Dejan Lukan OSSEC Introduction In this article we'll present the open source host-based intrusion detection system, which is needed if we would like to detect host-based attacks...
Management, compliance & auditing September 26, 2013 Karthik Enterprise Security Management An enterprise invests considerable amount of time in its day to day scanning and managing patched for the infrastructure. But, an enterprise psychological analysis...
Management, compliance & auditing September 20, 2013 Robert Barnes Conditional Complexity of Risk Models Introduction "Conditional complexity" (also called cyclomatic complexity) is a term used to measure the complexity of software. The term refers to the number...
Management, compliance & auditing August 28, 2013 Dimitar Kostadinov U.S. Cyber Policy – Course and Legal Aspects Image courtesy of Gualberto107 / FreeDigitalPhotos.net Introduction Cyber policy is an important issue that many would qualify as pending. Even leading...
Management, compliance & auditing April 19, 2013 Daniel Dimov Software Patent Law: EU, New Zealand, and the US compared 1. Introduction A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the...
Management, compliance & auditing March 4, 2013 arD3n7 Exception management An organization is a complex structure. We can set up frameworks, lay out processes and chart our policies and procedures to be followed; however, in practice...
Management, compliance & auditing February 14, 2013 Jesse Valentin Anatomy of a Risk Assessment To an organization that is serious about security and wants to identify the most efficient way to invest in security solutions, a risk assessment is absolutely...
Management, compliance & auditing January 10, 2013 Daniel Dimov Differences between the privacy laws in the EU and the US Everything we do in the Internet leaves digital fingerprints. Therefore, it is only logical that many web users are worried about the issue of privacy. Their...
Management, compliance & auditing January 2, 2013 Pierluigi Paganini Importance of a BYOD Policy for Companies [highlight color="blue"]Interested in formal iPhone forensics training? Check out our 3 day iPhone and iOS forensics course now available. [/highlight] The...