This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Org Structure. Technology. Regulation.
At the same time, we also have changes at every layer of the protocol stack and this is driven by an increased push for encryption—not just encryption, strong encryption.". We're responsible for the CIS benchmarks and the CIS controls.
However, we all know infosec/cyber/IT is awesome at intelligently assessing risk … right? Sometimes the timing makes a difference between a success (catching ransomware before it encrypts) and a failure (like, I dunno, detecting ransomware by looking for a ransom note). Related posts: “Can We Have “Detection as Code”?”
The states of Nevada, Minnesota and Washington stand out for having their own laws on the books creating liability in certain situations for businesses that handle credit card transactions and are not in compliance with PCI-DSS. States also differ on other data privacy and IT security compliance laws.
We only had Infosec Europe and the most we got out of there was some free USB sticks… If we were lucky they would be 500 megs. It’s so easy to manipulate anyone that works in infosec. Yeah, infosec is full of characters. When I started there were no such things as conferences such as BSides.
Building a strong incident response plan with play books and calibrating regularly via tabletop exercises with cross functional stakeholders is paramount. Traditionally, InfoSec lies within the IT organization, and Privacy is housed inside the Legal department. Business continuity plans can help mitigate disruptive incidents.
If you’re new to the information security field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification. New Book - Kali Linux Revealed Mastering the Penetration Testing Distribution More exciting news!
In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold.
In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold.
However, we all know infosec/cyber/IT is awesome at intelligently assessing risk … right? Sometimes the timing makes a difference between a success (catching ransomware before it encrypts) and a failure (like, I dunno, detecting ransomware by looking for a ransom note). So, thoughts? :-).
In the book The Art of Invisibility , I challenged my co author Kevin Mitnick to document the steps needed to become invisible online. It's a process of protecting critical information through encryption and being aware of the potential for eavesdropping on conversations. There are a lot. Maintaining OpSec is everyone's responsibility.
Vamosi: For this episode I also want to weigh in on a very controversial topic within infosec today. Now, if you’ve been around infosec for any length of time, you are probably thinking about Diffie-Hellman, RSA, Elliptical Curve, even SHA. That’s also why you occasionally hear about depricated encryption schemes.
His book, Hacking Google was a best seller, but after, he just wasn't feeling it. Vamosi: Burnout is a major concern in the InfoSec world. Vamosi: Unlike what you might see on TV or in the movies, or in a book, hackers, are indistinguishable from anyone else. Jack has been chronicling other people in InfoSec.
Raymond, from his 1999 book The Cathedral and the Bazaar. Not only do I get a much faster time to market, I don’t have to worry about rolling my own encryption. Really, never roll your own encryption. SSH or Secure Shell is an encrypted connection over Port 22. But it’s actually from Eric S. Just don’t.
Raymond, from his 1999 book The Cathedral and the Bazaar. Not only do I get a much faster time to market, I don’t have to worry about rolling my own encryption. Really, never roll your own encryption. SSH or Secure Shell is an encrypted connection over Port 22. But it’s actually from Eric S. Just don’t.
Luke Langefels, Security Consultant One of the talks that I went to while at DefCon was Matt Burch’s presentation on defeating ATM disk encryption. Switching to full-disk encryption would have effectively remediated the 6 findings. This was the approach Burch ultimately recommended to Vynamic.
His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Bruce Schneier | @schneierblog.
I’m Robert Vamosi, and in this episode we’re talking about ways in which bad actors can manipulate legitimate tools to gain persistence on a site so they can steal data or encrypt it for ransom. And that's just because it's not in the books VAMOSI: True. And, of course, we are wondering why this is the case.
I first interviewed him a few years ago at Black Hat for my book When Gadgets Betray Us. Gosh, there must be 20 or more villages at DEF CON if you want to learn radio if you want to learn tampering with seals if you want to learn encryption if you want to learn, you name it. There was a cannabis village recently at DEF CON.
I first interviewed him a few years ago at Black Hat for my book When Gadgets Betray Us. Gosh, there must be 20 or more villages at DEF CON if you want to learn radio if you want to learn tampering with seals if you want to learn encryption if you want to learn, you name it. There was a cannabis village recently at DEF CON.
There’s an online war in Ukraine, one that you haven’t heard much about because that country is holding its own with an army of infosec volunteers worldwide. RSAC also attracts some of the top researchers in infosec. I've been trying to write a book forever while having fun. That's not news. It's a pandemic.
He also talks about the future generation of hacking, what motivates young people today to think outside the box in a world where infosec is increasingly becoming vocational and expected. When people feel threatened by it they want to throw the book at Yeah. I wrote a book with Kevin Mitnick, a convicted felon. Vamosi: Hackers.
Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. Again, all all around the InfoSec community.
No, I simply bought Shon Harris’s massive book CISSP- All-in-One Exam Guide -- and read through it -- not one, twice. They're basically entirely encrypted. I joined a Discord server called InfoSec prep. Then I took the test and hoped for the best. So ask me anything about RAID servers. I’m waiting. People like me.
To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.
To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content