Good afternoon everybody! I hope your day is going well.
Here are today's Interesting Information Security Bits from around the web.
- Here is a list of some cell phone forensics tools.
List of Cell Phone Forensic tools!
Tags: ( cellphone forensics ) - For those FAIR proponents or those investigating its use, Jack is giving a webinar that is a case study of a Fortune 100 company. It doesn't specifically state that it uses FAIR, but I think it's a fair guess that it does 🙂
Becoming relevant... | RiskAnalys.is
Tags: ( fair risk-management ) - A neat article about the network at Defcon with some cool pictures.
Inside the World's Most Hostile Network | Threat Level | Wired.com
Tags: ( defcon ) - VoIP kinda got smacked around at Defcon. You might want to rethink that mixed VoIP and data network you were thinking about implementing.
Researchers Hack IP Video - DarkReading
Tags: ( voip ) - A very informative post from Lori. You should read it.
Cloud Changes Cost of Attacks
Tags: ( cloud quantitative ) - Alex digs into an interesting metric, User Frustration Hours (UFH), that makes more and more sense as I think about. We have all experienced it and I think his very mention of policy/process avoidance based on UFH from an information security perspective definitely deserves some thought.
Quantitative Analysis of Web Application Usefulness (Or Why Your ROSI is wRONG) << The New School of Information Security
Tags: ( general ) - Read Chris's interview of Richard Levick. Seriously, go read it. Then send it to your infosec analysts, CISO, CEO and Board of Directors.
Reputation Risk Q&A - Richard Levick (1 of 2) << Risktical Ramblings
Tags: ( reputation )
That's it for today. Have fun!
Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.
Kevin
{ 0 comments… add one now }