Advertisement
Home 2013 July

Monthly Archives: July 2013

The Lifecycle of Cybercrime

0
Ethical hacker and security researcher with Trustwave Nicholas Percoco keynotes at RSA Conference 2013, addressing nuances of the present-day cybercrime. Nicholas Percoco: Thank you...

Before, During, and After – 20 Years of DEFCON, or FEDCON?

0
Some of the pioneers of Defcon, Gail Thackeray and Dead Addict, take the floor at Defcon 20 to recall how it all started and...

Pleasant Password Server review

2
For example:- It is necessary to keep track of service account passwords (assuming that the organization isn’t using operating systems that support managed service...

Cyber Jihad: Jihadist Use of the Internet 2008-2011

0
Jeff Bardin from Treadstone 71 provides a detailed overview of the Jihadist activities on the Internet, including their software tools, online resources, etc. Good day...

Interview with Jay Jacobs, Co-Author of Verizon’s Data Breach Investigations Report

0
As the Principal on Verizon’s RISK team, Jay Jacobs utilizes the VERIS (Vocabulary for Event Recording and Incident Sharing) framework to collect, analyze...

Pandora’s Box Meets the Sword of Damocles: Investigating and Preventing Cyberbullying

0
The increasingly disturbing issue of the cyberbullying phenomenon getting discussed and analyzed by InfoSec professionals David Kirkpatrick, Sameer Hinduja, Joe Sullivan, Jaana Juvonen and...

Busting Anti-Theft Software Myths: Interview with Simon Roses Femerling

0
Simon Roses holds a B.S. from Suffolk University (Boston), Postgraduate in e-Commerce from Harvard University (Boston), and an Executive MBA from IE Business...

STAY CONECTED

934FansLike
549FollowersFollow

LATEST NEWS