Agregátor RSS

Netskope Survey: More Than 60 Percent Of IT's Most Security Savvy Professionals Are Either Unaware Of Their Company's Cloud App Policies Or Don't Have One

DarkReading.com - 27 Únor, 2014 - 00:45
In absence of cloud app policies, more than two-thirds of attendees surveyed said they would consider their company's privacy policy before downloading an app
Kategorie: Hacking & Security

A Model for Licensing IT Security

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Legal Issues

Paper Added: August 6, 2013

Kategorie: Hacking & Security

Discovering Security Events of Interest Using Splunk

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Logging Technology and Techniques

Paper Added: July 17, 2013

Kategorie: Hacking & Security

Practical Cyber Security Training Techniques for New IT Support Employees

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Best Practices

Paper Added: July 19, 2013

Kategorie: Hacking & Security

Detecting Security Incidents Using Windows Workstation Event Logs

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Logging Technology and Techniques

Paper Added: July 9, 2013

Kategorie: Hacking & Security

Security Best Practices for IT Project Managers

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Best Practices

Paper Added: June 24, 2013

Kategorie: Hacking & Security

A Practical Social Media Incident Runbook

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Incident Handling

Paper Added: June 20, 2013

Kategorie: Hacking & Security

SANSFIRE 2011

SANS Reading Room - 6 Srpen, 2013 - 21:00
SANSFIRE 2011
Kategorie: Hacking & Security

Web Application Injection Vulnerabilities: A Web App's Security Nemesis?

SANS Reading Room - 6 Srpen, 2013 - 21:00

Categories: Application and Database Security,Securing Code,Security Basics

Paper Added: June 14, 2013

Kategorie: Hacking & Security

Electronic Medical Records: Success Requires an Information Security Culture

SANS Reading Room - 6 Srpen, 2013 - 21:00

Categories: HIPAA,Compliance

Paper Added: June 5, 2013

Kategorie: Hacking & Security

Corporate vs. Product Security

SANS Reading Room - 6 Srpen, 2013 - 21:00

Categories: Best Practices,Incident Handling,Security Policy Issues,Management & Leadership

Paper Added: June 3, 2013

Kategorie: Hacking & Security

Securing BYOD With Network Access Control, a Case Study

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Network Access Control

Paper Added: May 23, 2013

Kategorie: Hacking & Security

Analyzing Polycom® Video Conference Traffic

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Protocols

Paper Added: June 4, 2013

Kategorie: Hacking & Security

Event Monitoring and Incident Response

SANS Reading Room - 6 Srpen, 2013 - 21:00

Categories: Incident Handling,Intrusion Detection

Paper Added: May 15, 2013

Kategorie: Hacking & Security

Dead Linux Machines Do Tell Tales

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: GIAC Honors Papers

Paper Added: May 15, 2013

Kategorie: Hacking & Security

Setting Up a Database Security Logging and Monitoring Program

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Application and Database Security

Paper Added: May 10, 2013

Kategorie: Hacking & Security

Managing the Implementation of a BYOD Policy

SANS Reading Room - 6 Srpen, 2013 - 21:00

Category: Management & Leadership

Paper Added: May 8, 2013

Kategorie: Hacking & Security

Log2Pcap

SANS Reading Room - 6 Srpen, 2013 - 21:00

Categories: Intrusion Detection,Forensics

Paper Added: May 1, 2013

Kategorie: Hacking & Security

Information Risks & Risk Management

SANS Reading Room - 6 Srpen, 2013 - 21:00

Categories: Best Practices,Getting Started/InfoSec,Security Awareness,Security Policy Issues,Management & Leadership,Data Loss Prevention

Paper Added: May 1, 2013

Kategorie: Hacking & Security
Syndikovat obsah