InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by InfoSec Institute
Aktualizace: 26 min 45 sek zpět

The Top 25+ Information Security Events and Conferences of 2018

17 Únor, 2018 - 20:01

Information security (InfoSec) conferences are a great way to become familiar with new developments and later trends in technology, as well as be made aware of the recent products and services to tackle today’s challenges arising from network weaknesses. They are also an occasion to share knowledge and tips with other professionals in the field, […]

The post The Top 25+ Information Security Events and Conferences of 2018 appeared first on InfoSec Resources.

The Top 25+ Information Security Events and Conferences of 2018 was first posted on February 17, 2018 at 1:01 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top Ten Information Security Thought Leaders

17 Únor, 2018 - 19:27

Living in an information age can be daunting. Even if you manage to cut out the noise of social media, and the unceasing barrage of ads, there is still an element of digital dependence that can torment you. We rely so heavily on the World Wide Web in daily life – everything from accessing our […]

The post Top Ten Information Security Thought Leaders appeared first on InfoSec Resources.

Top Ten Information Security Thought Leaders was first posted on February 17, 2018 at 12:27 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top Five Open Source Intelligence (OSINT) Tools

17 Únor, 2018 - 18:01

In this article, we will look at top five Open Source Intelligence tools. Before we jump directly on tools, it is essential to understand what is Open Source Intelligence(OSINT) and how it can benefit researchers/malware actors/organizations, etc. What is OSINT? Open Source Intelligence(OSINT) refers to a collection of data from public sources to be used […]

The post Top Five Open Source Intelligence (OSINT) Tools appeared first on InfoSec Resources.

Top Five Open Source Intelligence (OSINT) Tools was first posted on February 17, 2018 at 11:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Top 5 Penetration Testing Tools and Their Reporting Features

17 Únor, 2018 - 17:29

Introduction In the Cybersecurity world today, there is one methodology that has proven to be quite effective in determining the security vulnerabilities of any business entity: Penetration Testing. It can be explicitly defined as follows: “It is the practice of testing a computer system, network, or web application, to find the vulnerabilities that an attacker […]

The post The Top 5 Penetration Testing Tools and Their Reporting Features appeared first on InfoSec Resources.

The Top 5 Penetration Testing Tools and Their Reporting Features was first posted on February 17, 2018 at 10:29 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Top Ten IoT Vulnerabilities

17 Únor, 2018 - 14:38

Kevin Ashton coined the phrase the “Internet of Things” (also known as “IoT”) back in 1999. This term represented the concept of a massive system where everyday appliances would communicate with each other through omnipresent sensors. Since then, consumers have connected smart devices amongst one another at an exponential rate. By 2020, there are estimates […]

The post The Top Ten IoT Vulnerabilities appeared first on InfoSec Resources.

The Top Ten IoT Vulnerabilities was first posted on February 17, 2018 at 7:38 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

PowerShell Language Modes-Part 1

16 Únor, 2018 - 21:28

In this article, we will discuss various PowerShell language modes. In Part 1 we will look at all the basics around PowerShell language and its various types. In Part 2 we will look at some of the bypasses which have been discovered in the previous version of Windows. What is Language Mode and its types? […]

The post PowerShell Language Modes-Part 1 appeared first on InfoSec Resources.

PowerShell Language Modes-Part 1 was first posted on February 16, 2018 at 2:28 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Privacy Concerns About Emotional Chatbots

16 Únor, 2018 - 21:11

Introduction Artificial Intelligence (AI) is evolving at an enormous speed and takes an increasingly more substantial part of our everyday life (think of the fully commercialized transactional robots Siri or Alexa as well intelligent agents in healthcare, automotive, and gaming industries). Being a classical representation of high-level machine intelligence, humanized, fully responsive machines perceiving and […]

The post Privacy Concerns About Emotional Chatbots appeared first on InfoSec Resources.

Privacy Concerns About Emotional Chatbots was first posted on February 16, 2018 at 2:11 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Consequences of the Late Announcement of Cyber-security Incidents

16 Únor, 2018 - 20:57

Introduction Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on electronic communication networks, provision of services, and national security. Although significant breaches that affect many users or extensively disrupt the functioning of an organization usually receive extensive media coverage, smaller security incidents may […]

The post Consequences of the Late Announcement of Cyber-security Incidents appeared first on InfoSec Resources.

Consequences of the Late Announcement of Cyber-security Incidents was first posted on February 16, 2018 at 1:57 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Security Considerations Surrounding CryptoMining as a Service

16 Únor, 2018 - 14:00

Virtual Currency Mining Undoubtedly, one of the more interesting news stories to follow over the last year has been the rise (and currently: the fall) of cryptocurrencies. Bitcoin, of course, is the best-known variety, but other currencies such as Litecoin (up about 8000%), ripple (up over 10,000%) and Ethereum (up about 8500%) also saw a […]

The post Security Considerations Surrounding CryptoMining as a Service appeared first on InfoSec Resources.

Security Considerations Surrounding CryptoMining as a Service was first posted on February 16, 2018 at 7:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Advantages & Disadvantages of Outsourcing Incident Response

13 Únor, 2018 - 15:41

Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get consistent, reliable results if an incident occurs. Many cybersecurity jobs go unfilled, because the pool of qualified applicants is currently smaller than the amount of jobs available. Thus, finding the right […]

The post The Advantages & Disadvantages of Outsourcing Incident Response appeared first on InfoSec Resources.

The Advantages & Disadvantages of Outsourcing Incident Response was first posted on February 13, 2018 at 8:41 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 5 Ways to Reduce the Cost of a Data Breach

12 Únor, 2018 - 15:42

Introduction According to the 2017 Cost of Data Breach Study, data breach costs in 2017 averaged $3.62 million. This is a large sum, but depending on factors such as the number of records exposed or the nature of the leaked information, losses can be much greater and even include reputational damages that may take several […]

The post Top 5 Ways to Reduce the Cost of a Data Breach appeared first on InfoSec Resources.

Top 5 Ways to Reduce the Cost of a Data Breach was first posted on February 12, 2018 at 8:42 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CRISC Domain 4: Risk and Control Monitoring and Reporting

9 Únor, 2018 - 22:28

What is Risk and Control Monitoring and Reporting? Risk monitoring and control are two elements that are responsible for keeping track of identified risks, residual risks, and new and emerging risks. In addition to this, they are also used to monitor the execution and implementation of plans for all of the known risks, and they […]

The post CRISC Domain 4: Risk and Control Monitoring and Reporting appeared first on InfoSec Resources.

CRISC Domain 4: Risk and Control Monitoring and Reporting was first posted on February 9, 2018 at 3:28 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CRISC Domain 3: Risk Response and Mitigation

9 Únor, 2018 - 22:18

What is Risk Response and Mitigation? In order to understand Risk Response and Mitigation, we first need to separate the two definitions and define them properly. The two work together hand in hand, but are different in their approaches to keeping your company going. Risk Response: Risk response is a series of processes and procedures […]

The post CRISC Domain 3: Risk Response and Mitigation appeared first on InfoSec Resources.

CRISC Domain 3: Risk Response and Mitigation was first posted on February 9, 2018 at 3:18 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to Perform Qualitative & Quantitative Security Risk Analysis

9 Únor, 2018 - 18:46

This article describes two type of risk analysis (quantitative and qualitative) and presents five practical examples of calculating annualized loss expectancy (ALE). Finally, it also describes risk handling and countermeasures. The CIA Triad of Information Security Confidentiality, integrity and availability, or the CIA triad, is a model designed to guide policies for information security within […]

The post How to Perform Qualitative & Quantitative Security Risk Analysis appeared first on InfoSec Resources.

How to Perform Qualitative & Quantitative Security Risk Analysis was first posted on February 9, 2018 at 11:46 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Meet InfoSec Institute at HIMSS18

9 Únor, 2018 - 17:37

The InfoSec Institute team will be at HIMSS18 on March 6-8. Come find us in the Cybersecurity Command Center at booth #8600-47 to learn how our award-winning training services will help you secure PHI and motivate your workforce to care about security. See SecurityIQ in Action — And Get a FREE Phishing Diagnostic Test! Demos […]

The post Meet InfoSec Institute at HIMSS18 appeared first on InfoSec Resources.

Meet InfoSec Institute at HIMSS18 was first posted on February 9, 2018 at 10:37 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Incident Responder Career Roadmap: From Entry Level to Executive

9 Únor, 2018 - 15:28

Introduction Finding a career as an incident responder has never been more possible than it is today. Practically every medium- to large-sized company should have either an in-house dedicated team of cybersecurity specialists, or service providers that can perform the function of an incident responder on their behalf. Such teams can be deployed within strict […]

The post Incident Responder Career Roadmap: From Entry Level to Executive appeared first on InfoSec Resources.

Incident Responder Career Roadmap: From Entry Level to Executive was first posted on February 9, 2018 at 8:28 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

5 Steps to Conducting an Enterprise Security Risk Analysis

9 Únor, 2018 - 14:29

In the world of cybersecurity, identifying risks and how they will impact the organization is of paramount importance. In general terms, risk is comprised of two specific components: The statistical probability of something going wrong The negative consequences that transpire as a result of it A risk analysis can help organizations identify risks and their […]

The post 5 Steps to Conducting an Enterprise Security Risk Analysis appeared first on InfoSec Resources.

5 Steps to Conducting an Enterprise Security Risk Analysis was first posted on February 9, 2018 at 7:29 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CRISC Resources

9 Únor, 2018 - 00:50

Passing and securing good marks in the CRISC exam requires the candidates to study the right material from the right resources. This article includes the necessary study resources for CRISC exam, including the best books, study guides, online resources, and practice exams. What is the Best Official Book to Help Prep for the CRISC? Candidates […]

The post CRISC Resources appeared first on InfoSec Resources.

CRISC Resources was first posted on February 8, 2018 at 5:50 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to Break Into the Field of Security Risk Management

8 Únor, 2018 - 15:28

A career in risk management takes place along the front lines of the ongoing cyber war. You must be logical, analytical and level-headed in order to lead the way and keep your company secure. What is Risk Management? A security risk manager’s job is to identify and prioritize threats to a company’s well-being and protect […]

The post How to Break Into the Field of Security Risk Management appeared first on InfoSec Resources.

How to Break Into the Field of Security Risk Management was first posted on February 8, 2018 at 8:28 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

4 Factors to Consider When Calculating the Cost of a Data Breach

8 Únor, 2018 - 15:16

Introduction Data breaches are one of the most common types of security incidents. It is quite possible, although it may be hard to prove, that every company around the globe was at some point a victim of information leakage. For instance, a breach may be as simple as accidently sending an email with corporate information […]

The post 4 Factors to Consider When Calculating the Cost of a Data Breach appeared first on InfoSec Resources.

4 Factors to Consider When Calculating the Cost of a Data Breach was first posted on February 8, 2018 at 8:16 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security