Interesting Information Security Bits for 08/05/2009

by kriggins on August 5, 2009

in Interesting Bits

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Here is a list of some cell phone forensics tools.
    List of Cell Phone Forensic tools!
    Tags: ( cellphone forensics )
  2. For those FAIR proponents or those investigating its use, Jack is giving a webinar that is a case study of a Fortune 100 company. It doesn't specifically state that it uses FAIR, but I think it's a fair guess that it does 🙂
    Becoming relevant... | RiskAnalys.is
    Tags: ( fair risk-management )
  3. A neat article about the network at Defcon with some cool pictures.
    Inside the World's Most Hostile Network | Threat Level | Wired.com
    Tags: ( defcon )
  4. VoIP kinda got smacked around at Defcon. You might want to rethink that mixed VoIP and data network you were thinking about implementing.
    Researchers Hack IP Video - DarkReading
    Tags: ( voip )
  5. A very informative post from Lori. You should read it.
    Cloud Changes Cost of Attacks
    Tags: ( cloud quantitative )
  6. Alex digs into an interesting metric, User Frustration Hours (UFH), that makes more and more sense as I think about. We have all experienced it and I think his very mention of policy/process avoidance based on UFH from an information security perspective definitely deserves some thought.
    Quantitative Analysis of Web Application Usefulness (Or Why Your ROSI is wRONG) << The New School of Information Security
    Tags: ( general )
  7. Read Chris's interview of Richard Levick. Seriously, go read it. Then send it to your infosec analysts, CISO, CEO and Board of Directors.
    Reputation Risk Q&A - Richard Levick (1 of 2) << Risktical Ramblings
    Tags: ( reputation )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments… add one now }

Leave a Comment

Previous post:

Next post: