Expert analysis
Wireless security considerations
Brad Haines is chief researcher of Renderlab.net and a noted expert in the field of wireless security. Brad has spoken at many international conferences and taught several …
Past, present and future of Metasploit
HD Moore is the CSO at Rapid7 and Chief Architect of Metasploit, an open-source penetration testing platform. HD founded the Metasploit Project with the goal of becoming a …
A closer look at SafeWallet for Mac
SafeWallet (v.1.0) is a password manager in which you can store all your passwords and all your private information that you want to have handy but accessible only to you …
Current threats and the evolution of cybercrime
Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is actively involved with SANS working with students, teaching, and maintaining and developing …
Private key management: Real world tips
It has always been taken for granted that the entire IT security industry understands that, as part of digital certificate management, it is necessary to manage the private …
Requirements of cloud-based network security
While some of the technical underpinnings that make up the cloud’s “secret sauce’, are relatively recent innovations, the business case for managing critical …
Weather forecast: Cloudy with a chance of compliance
If there are constants to every information security conference, they are these: threats are up and the job of the average security professional becomes more demanding every …
How to protect employees with a web filtering solution
Let’s face it, this is not your father’s Internet (or, for those of us who first went online in the late 90’s, even John Postel’s Internet.) As …
Best practices in approaching vendor risk assessment
When it comes to vendor risk assessment, a one-size-fits-all approach is not the way to go. Every vendor you bring into your organization will add its own unique set of risks …
How to become a published author in information security
A large security event is always filled with exceptionally clever attendees who are writers in one way or another. Some produce training materials for their employers, others …
The value of your credentials
As surprising as this may sound, earlier this year stolen twitter credentials were valued at almost $1,000. When compared to credit card details that fetch less than $1, why …
How to sell security to senior management
While companies know they have to invest in IT to do their jobs, IT security always ends up looking like an added cost in the eyes of the management. So, what are the things …