Category Archives: IT and Computer Security

Wikileaks Exposure Points to Bigger Data Security Problems in 2011

I was in DC recently and was looking at some WWII memorabilia that was used during the 1940’s to reinforce the importance of information security. While there were no modern computers, cell phones, or even Internet during this time, the … Continue reading

Posted in Ethical Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment

CISSP Study Tips – Movies with CISSP Exam Concepts

Studying for and passing the CISSP exam is not an easy task.  It requires a combination of CISSP training, reviewing, studying, and practice tests.  Many test candidates invest in a good study guide such as the CISSP Exam Cram by … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , | Leave a comment

The DHS Cyber Security Infrastructure Protection Act of 2010

What are your thoughts on giving DHS oversight over portions of the Internet?  A new bill, HR 6423, is planning on doing just that.  This bill would give DHS the right to regulate portions of the Internet that is deemed … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Security Certification | Tagged , , , , , | Leave a comment

Employee Access Review – Preventing Access Creep

Access creep is a common problem and one way that employees sometimes end up with a greater level of access than what they should have.  One of the items we examine during a security assessment is employee access. While reviewing … Continue reading

Posted in Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

CompTIA Ready’s an Upgrade to the Cyber Security Foundations Cert: Security+ SY0-301

If you’ve been putting off obtaining your Security+ certification and are not going to attempt the exam before December 31, 2010, you may want to wait until the new version of Security+ SY0-301 is released.  CompTIA is planning the new … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , , , , | Leave a comment

Michael Gregg Demo’s how Snooping on Strangers is Made Easy with Firesheep

I blogged about sidejacking last week.  This is a common threat and one that cyber security experts have identified as a major security flaw since at least 2004. Fox News asked Michael Gregg to stop by their studio and demonstrate … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , , | Leave a comment

CompTIA’s moving beyond cyber security foundations to develop an advanced IT security certification

While CompTIA is widely known for their foundational coverage of networking and security, they are now developing a more advanced security certification, the CompTIA Advanced Security Practitioner (CASP).   While this advanced security certification is still in the development phase, what is … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , , , , | Leave a comment

Stuxnet changes cyber security battlefield

While many things are unknown about Stuxnet, what is known is that it marks a critical change in cyber war.   So much so that Kaspersky labs describes it as “a prototype of a cyber-weapon that will lead to the creation … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , | Leave a comment

Ethical Hacking Cloud Computing Concerns

Cloud computing is something that continues to grow in popularity. While cloud computing offers many benefits, there are significant security concerns when considering moving critical applications and sensitive data to public and shared cloud environments.  Some items to consider include: … Continue reading

Posted in IT and Computer Security | Tagged , , , , | Leave a comment

Hackers Plan to Cash in During Last Minute Rush of Tax Filing Season

While many of us may be thinking of ways to spend our tax returns, hackers are busing thinking of ways to steal our money. The possibilities are endless: Identity theft – Someone else filing your return using your social security … Continue reading

Posted in IT and Computer Security | Tagged , , , , | Leave a comment