Video Screencast Help

SecurityExpressions

Results for SecurityExpressions

Let’s face it users cannot be trusted to know their entire password, I am not talking about the user that writes down their passwords on sticky notes the bad guys would need physical access to actually access those. What I am really speaking to how ...
Blog Entry by Joseph.Rogalski | 29 Apr 2013 | 9 comments
  Hola a tod@s; Inicio con la siguiente pregunta: ¿los algoritmos criptográficos actuales se basan para obtener las claves en la dificultad para factorizar un número entero en varios primos unicos y de multiplicidad uno? Este número entero está ...
Idea by calygula | 28 Apr 2013 | 0 comments
WordPress is the most commonly used blogging platform. It is easy to install and has a great ecosystem of plugins and enhancements that extend its capabilities beyond simply posting pictures of your cats. Unfortunately, millions of inexperienced users ...
Blog Entry by uuallan | 23 Apr 2013 | 0 comments
I’m optimistic on the current trends in security. The concepts of “intelligence” and “big data” have to potential to shift focus to counter the current threat landscape of intentional attacks to steal or destroy valuable information. Additional focus on ...
Blog Entry by PaulTobia | 18 Apr 2013 | 0 comments
One of the biggest problems information security encounters is either the perception or reality of slowing down the business. I’ve encountered this myself in my career.  One of the ways I dealt with this problem is through an effective use of the risk ...
Blog Entry by Phil Harris | 16 Apr 2013 | 0 comments
I need a solution in first , i m sorry cause i dont know enough about the fourm standards , but i got a question : does the IDS technique deffereniate with the application that will ...
Forum Discussion by yuriman | 12 Apr 2013 | 1 comment
In the famous Kenny Rogers song Lucille, a scorned husband confronts his cheating wife in a bar and publicly shames her by reminding her that she “…picked a fine time to leave me Lucille, with four hungry kids and a crop in the field.” (my apologies if ...
Blog Entry by uuallan | 11 Apr 2013 | 1 comment
  Introduction OpenIOC establishes a standard for recording, defining and sharing information both internally and externally in a machine readable format [1]. OpenIOC allows a forensic investigator to describe IOC (Indicators of ...
Blog Entry by Krishnan Narayan | 08 Apr 2013 | 0 comments
Recently, there have been a string of high profile compromises attacking both could based services, a cloud based note taking site, a fast food companies Twitter account, as well as corporations and individuals.  A well known technology writer had his ...
Blog Entry by Joseph.Rogalski | 08 Apr 2013 | 3 comments
Is it naïve of us to think we can ever be perfectly secure? Whether it’s physically or digitally there is always a risk that something bad is going to happen. To protect ourselves physically we install alarms, locks, buy safe cars, have automatic lights, ...
Blog Entry by rshaker2 | 03 Apr 2013 | 2 comments