Monthly Archives: July 2013
The Lifecycle of Cybercrime
Ethical hacker and security researcher with Trustwave Nicholas Percoco keynotes at RSA Conference 2013, addressing nuances of the present-day cybercrime.
Nicholas Percoco: Thank you...
Before, During, and After – 20 Years of DEFCON, or FEDCON?
Some of the pioneers of Defcon, Gail Thackeray and Dead Addict, take the floor at Defcon 20 to recall how it all started and...
Pleasant Password Server review
For example:- It is necessary to keep track of service account passwords (assuming that the organization isn’t using operating systems that support managed service...
Cyber Jihad: Jihadist Use of the Internet 2008-2011
Jeff Bardin from Treadstone 71 provides a detailed overview of the Jihadist activities on the Internet, including their software tools, online resources, etc.
Good day...
Interview with Jay Jacobs, Co-Author of Verizon’s Data Breach Investigations Report
As the Principal on Verizon’s RISK team, Jay Jacobs utilizes the VERIS (Vocabulary for Event Recording and Incident Sharing) framework to collect, analyze...
Pandora’s Box Meets the Sword of Damocles: Investigating and Preventing Cyberbullying
The increasingly disturbing issue of the cyberbullying phenomenon getting discussed and analyzed by InfoSec professionals David Kirkpatrick, Sameer Hinduja, Joe Sullivan, Jaana Juvonen and...
Busting Anti-Theft Software Myths: Interview with Simon Roses Femerling
Simon Roses holds a B.S. from Suffolk University (Boston), Postgraduate in e-Commerce from Harvard University (Boston), and an Executive MBA from IE Business...