Tag Archives: Assessment

Cyber Security Bill Stalled… But Sponsors Still Push On

Cyber security continues to be an ongoing challenge with no easy answers… Earlier this month, the senate failed to pass a bill known as the Cybersecurity Act of 2012.  The sponsors of the bill are still pressing the issue with … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

Three Years Later – Agent.btz Worm Still a Threat

Three years after a devastating breach of U.S. military networks new versions of the malware, known as agent.btz, is still considered a threat. While it’s widely believed that the Russians or Chinese may have created this worm to spy on … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , | Leave a comment

The New CompTIA CASP Certification

Later this year, CompTIA will be releasing the CompTIA Advanced Security Practitioner (CASP) certification.   It is time for this certification. It’s targeted directly at individuals that have worked in security for a number of years in “hands-on” security.  We are … Continue reading

Posted in Ethical Hacking, Security Certification, Training and Education | Tagged , , , , , | Leave a comment

Employee Access Review – Preventing Access Creep

Access creep is a common problem and one way that employees sometimes end up with a greater level of access than what they should have.  One of the items we examine during a security assessment is employee access. While reviewing … Continue reading

Posted in Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

Ethical Hacking Cloud Computing Concerns

Cloud computing is something that continues to grow in popularity. While cloud computing offers many benefits, there are significant security concerns when considering moving critical applications and sensitive data to public and shared cloud environments.  Some items to consider include: … Continue reading

Posted in IT and Computer Security | Tagged , , , , | Leave a comment