Latest Blog Posts

7fef78c47060974e0b8392e305f0daf0

Infosec Island Network Welcomes 1000th Member

March 23, 2010 Added by:Infosec Island Admin

The Infosec Island Network is pleased to announce the registration of our 1000th member since our launch September 1, 2009. Our community of professionals now represents more than 100 registered companies and organizations, and our traffic exceeds 40,000 visitors monthly.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Interview with Former White House CIO Theresa Payton

March 23, 2010 Added by:Anthony M. Freed

I recently had the pleasure of making the acquaintance of the illustrious Theresa Payton, who's long and vibrant career has spanned multiple industry sectors and government service at the highest levels.

Comments  (4)

D13f77e036666dbd8f93bf5895f47703

Big Brother Has the Power to Turn Off Your Car

March 22, 2010 Added by:Theresa Payton

As our world becomes more automated and every day gadgets are infused with computer machinery, you are more at risk of a glitch, or worse. Over 100 car owners in Austin, TX had the worst surprise ever recently.   Cars began behaving badly - they would not turn on or the horns were honking.

Comments  (11)

39d0a8908fbe6c18039ea8227f827023

The limits of social network privacy

March 19, 2010 Added by:Mike Himley

The Lone Ranger was one of my favorite shows growing up. With his trusty side kick Tonto, he would always appear just in time to foil the bad guys and leave everyone wondering..."who is that masked man?"  Was it really that hard to determine his identity?

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Editor Featured at BusinessWeek.com

March 19, 2010 Added by:Infosec Island Admin

This weekend, BusinessWeek.com will feature our own Anthony M. Freed, Editor and Business Development Director for the Infosec Island Network.

Comments  (7)

Ba5964a1284ac16d4277991e7225699c

Why we did it, and don't want to make money from it..

March 18, 2010 Added by:Jason Remillard

A description of the automated wordpress security plugin by SSM. If you're running WP, check it out!

Comments  (0)

A1579a5845ff87a92326174e52499707

Hackers Lurking in Hotel Networks

March 17, 2010 Added by:Mark Smail

Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.  

Comments  (3)

Cc5b3987fdda8edb89d6f82eb0d64fed

HTML insecurities

March 16, 2010 Added by:_ Comet

A breif history and evolution of the web...Way back when, the first webserver was created, serving HTML documents.  HTML was designed to show documents with hypertext links, and also to allow the documents to have semantic markup that would be displayed to the reader.

Comments  (0)

B3f8f23c67988f1d4f507a11b1442cc0

Clash of Security and Social Network Marketing

March 16, 2010 Added by:Crystal Craven

Information Security Gurus and Marketing Professionals are often at odds with each other in the business realm. Marketing used to primarily be a print and face to face business function. Thanks to the over-haul of standard marketing strategies, marketing has grown new roots on the web and has found itself buried deep within social networking sites like LinkedIn, Facebook and Twitter.

Comments  (9)

38829f9c58dc699a3ef4caf9edf69b9a

Executive Series Tech Tip - Inadequate Vulnerability Assessment

March 16, 2010 Added by:Michael Bruck

Your latest Vulnerability Assessment is likely a waste of your IT Budget dollars!  Why? 

Comments  (5)

00fd6160b9db2d91e663a578d87cbaf3

Vigilantes or Public Servants?

March 15, 2010 Added by:Wayde York

No one likes SPAM (the email variety.) Every responsible user of the Internet and surely every responsible information security professional would agree that anti-spam efforts are needed and likely should be expanded. What happens, however, when the Internet-based anti-spam agents become a hindrance to business?

Comments  (3)

37d5f81e2277051bc17116221040d51c

Social Media Sticky Situations

March 15, 2010 Added by:Robert Siciliano

Maybe you’re a Mom or a Dad, a Student or a Grad. No matter what you are, you have a reputation to protect. How we are viewed in society matters to most people. Being viewed as someone who is respectable, responsible, someone who has integrity and is generally a decent person is what most people strive for.

Comments  (0)

E4b33dbe234685965beb3e9f2a0ad456

Need to consolidate information security compliance efforts? Try open source.

March 12, 2010 Added by:Ted LeRoy

Many organizations have to comply with multiple regulatory requirements for their information security infrastructures.  Fragmented efforts to comply Sarbanes-Oxley (sarbox or SOX), Gramm Leach Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA),  Payment Card Industry - Data Security Standard (PCI-DSS), and ISO 27000 series, to name a few, can result in c...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Releases Second Video of Enhanced XerXeS DoS Attack on Apache Vulnerability

March 11, 2010 Added by:Anthony M. Freed

Infosec Island has once again gained exclusive access to a video demonstration of the XerXeS DoS. This new video shows a little more of the XerXeS dashboard, and reveals even more about the attack technique – watch the text box on the left as Jester mentions “Apache” for the first time outside of our private conversations.

Comments  (15)

2ae549cf604c064a34019c7bd4a81e24

Newbie Introduction to Digital Forensics Part 2

March 08, 2010 Added by:Juan Granados

The information available on the internet can be a blessing and a curse at the same time. The multitude of information can be overwhelming for the newly annointed "Padawan" learner. One thing was clear....Forensic analysis was an art rather than a science. My hope of finding a "Cliff's Notes" version of "Digital Forensics" would prove to be impossible.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Simple Log Review Checklist Released!

March 08, 2010 Added by:Anton Chuvakin

Today, many people are looking for very simple solutions to big and complex problems – and the area of logging and log management is no exception. Following that theme, we have created a "Critical Log Review Checklist for Security Incidents" which is released to the world today.

Comments  (1)


« First < Previous | 471 - 472 - 473 - 474 - 475 | Next > Last »