Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, August 04, 2009
Conficker talk sanitized at Black Hat to protect investigation
Video rental records are afforded more privacy protections than your online data.; Fake ATM doesn't last long at hacker meet
Security professionals, nice to get to know you I'd like to take this opportunity, as any good host would do, and welcome you to my guest blog for the month of August. For the next four weeks or so, I'll try and take you on a journey into my InfoSec-centric mind; sharing my research, views, fascinations, and decisions.
August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.
Closing the Risk Gap in Privileged Access Control In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance. Learn More
Identity Management: complexity made simple Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today. Identity Management: complexity made simple