survey

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Rob is starting up a new endeavor that should be interesting.
    Practical Exploitation
    Tags: ( general )
  2. Craig is looking for some people to take a quick survey on Cloud Security Threats. Help him out.
    Cloud Security Threats Survey | Cloud Security
    Tags: ( survey cloud )
  3. Pretty slick.
    Running a command on every machine in your domain from the command line
    Tags: ( scripting )
  4. This is a good read for all in infosec independent of the job focus.
    From the CIO: Why You Didn't Get the CISO Job - CSO Online - Security and Risk
    Tags: ( general business )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 1 comment }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. A very well put together post. Check out the difference between Defensive Avoidance and Vigilance to Detail.
    Defensive Avoidance vs Vigilance to Detail << wirewatcher
    Tags: ( general )
  2. Hak5 is 4 years old. If you are not aware of this web video series, you should check it out.
    Hak5 - Technolust since 2005 >> Happy 4th Birthday Hak5
    Tags: ( general )
  3. Want to help out a student? Check out this post and take the survey.
    Help a Grad Student: Cloud Security Survey (The Falcon's View)
    Tags: ( survey )
  4. Something you should be aware of. The person carrying that iPod touch or iPhone into your environment may not be listening to music or talking to their buddy.
    Weaponizing Apple's iPod Touch - DarkReading
    Tags: ( ipod-touch pentest )
  5. Some thoughts on DirectAccess.
    Guest blog: Windows 7 Security - Microsoft DirectAccess | Graham Cluley's blog
    Tags: ( windows-7 direct-access )
  6. Part 2 of Chris's interview with Richard Levick is up.
    Reputation Risk Q&A - Richard Levick (2 of 2) << Risktical Ramblings
    Tags: ( reputation )
  7. A nice article by Andy on the topic of choice.
    My Risk, My Choice >> Andy ITGuy
    Tags: ( risk )
  8. An interesting tool has entered beta state.
    The Professional Security Testers Warehouse for the CEH GPEN QISP Q/ISP OPST CPTS - A Beta Version of NPing has been released
    Tags: ( tools )
  9. This page on the World Health Organization's website provides information you can use to track H1N1. We will be moving into flu season in North America soon, so keeping an eye on this is warranted.
    WHO | Disease Outbreak News
    Tags: ( h1n1 )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

And another Friday dawns. I hope yours goes well. Here we go with today's bits.

From the Blogosphere.

Via Alan over at StillSecure, the Aberdeen Group is looking for some data on IT Security Patch and Vulnerability Management. To get it, they are asking for us to participate in a survey. We get a shiny report gratis if we do. I probably will.

There is post up over at tssci-security that is taking a look at a several of topics all mashed together, the value of the CISSP certification, specialist or generalist when it comes to InfoSec and a new project being put together by the OWASP group, the People Certification Project. Some interesting thoughts in both the post and comments. BTW - he references Dan Greer's Source Boston keynote speech. It is well worth reading several times as I believe I have noted before.

Looks like there are some local root shennanegins that can be excersized on a Mac with versions 10.4 and 10.5 of Mac OS X installed. Good old suid fun, but does it really matter? Check out Zero Day's post and come to your own conclusions.

The Princess of Antiquity is tackling fairly daunting task in bringing a series of articles to us about cryptography that are couched terms the layman can understand. The first is up and is well written. Check it out.

Tom over at Spylogic gave a talk about Online Social Networks: 5 threats and 5 ways to use them safely. He has made his presentaion available here.

JJ has some good guidance for us if we are considering the implimentaion of 802.1x. Very good stuff.

Via Security4All, Backtrack 3 Final has been released.

From the Newsosphere.

Via NetworkWorld, Mitchell Ashley reports to us that Red Hat has decided to develop their own virtualization platform based on the Kernel Virtual Mode which is built into the Linux kernel. Go read his article for the reasons for this decision.

From Hack in the Box and ARN, a new report is out about a skills shortage in IT positions, including security specialists, is causing salaries to rise. Good for those down under.

Have a great Friday and wonderful weekend.

Kevin

Technorati Tags: , , , , , , , , , ,

{ 0 comments }