SANS Reading Room
A Model for Licensing IT Security
Category: Legal Issues
Paper Added: August 6, 2013
Discovering Security Events of Interest Using Splunk
Category: Logging Technology and Techniques
Paper Added: July 17, 2013
Practical Cyber Security Training Techniques for New IT Support Employees
Category: Best Practices
Paper Added: July 19, 2013
Detecting Security Incidents Using Windows Workstation Event Logs
Category: Logging Technology and Techniques
Paper Added: July 9, 2013
Security Best Practices for IT Project Managers
Category: Best Practices
Paper Added: June 24, 2013
A Practical Social Media Incident Runbook
Category: Incident Handling
Paper Added: June 20, 2013
Web Application Injection Vulnerabilities: A Web App's Security Nemesis?
Categories: Application and Database Security,Securing Code,Security Basics
Paper Added: June 14, 2013
Electronic Medical Records: Success Requires an Information Security Culture
Categories: HIPAA,Compliance
Paper Added: June 5, 2013
Corporate vs. Product Security
Categories: Best Practices,Incident Handling,Security Policy Issues,Management & Leadership
Paper Added: June 3, 2013
Securing BYOD With Network Access Control, a Case Study
Category: Network Access Control
Paper Added: May 23, 2013
Analyzing Polycom® Video Conference Traffic
Category: Protocols
Paper Added: June 4, 2013
Event Monitoring and Incident Response
Categories: Incident Handling,Intrusion Detection
Paper Added: May 15, 2013
Dead Linux Machines Do Tell Tales
Category: GIAC Honors Papers
Paper Added: May 15, 2013
Setting Up a Database Security Logging and Monitoring Program
Category: Application and Database Security
Paper Added: May 10, 2013
Managing the Implementation of a BYOD Policy
Category: Management & Leadership
Paper Added: May 8, 2013
Analysis of the building blocks and attack vectors associated with the Unified Extensible Firmware Interface (UEFI)
Category: Managed Services
Paper Added: May 2, 2013
Log2Pcap
Categories: Intrusion Detection,Forensics
Paper Added: May 1, 2013
Information Risks & Risk Management
Categories: Best Practices,Getting Started/InfoSec,Security Awareness,Security Policy Issues,Management & Leadership,Data Loss Prevention
Paper Added: May 1, 2013
Using IOC (Indicators of Compromise) in Malware Forensics
Categories: Incident Handling,Malicious Code,Forensics
Paper Added: April 22, 2013