Show Filters
Filtering by Service Area: Threat Management & Response
Embrace BYOD In Your Organization
The future of mobile computing was foreshadowed in science fiction and comic strips years ago. In...
Encrypt Your Secrets with a Deck of Cards
Bruce Schneier, an American cryptographer and security expert, created the Solitaire cryptographi...
Tevora’s Tokenization & Data Field Encryption
Lake Forest, CA – November 2010 – Principal Consultant Ray Zadjmool has publis...
Read More about Tevora’s Tokenization & Data Field Encryption
Tevora’s Tokenization & Data Field Encryption
Ray Zadjmool in ISSA Journal Lake Forest, CA – November 2010 ...
Read More about Tevora’s Tokenization & Data Field Encryption
Two-Factor Authentication Using Your Cell Phone
Factors of Authentication In the world of Information Security, Three factors (or types) of...
Read More about Two-Factor Authentication Using Your Cell Phone
The tool WhatWeb needs to be added to any pen tester’s arsenal. WhatWeb is not a web vulnerabil...
Suricata Intrusion Detection and Prevention Engine 1.0.0 released
Suricata is a multi-threaded intrusion detection/prevention engine. This engine claims it is not ...
Read More about Suricata Intrusion Detection and Prevention Engine 1.0.0 released
[Security Scripts] Whois for Python
Whois.py is a script that makes it fast and easy to store Arin information about specific IPs. Th...
Using Insecure Protocols – FTP
Considering how security has evolved, it’s surprising that many companies still depend on old t...
Today it’s not if your organization will have an electronic incident it’s when will that inci...
How to Parse Firewall Configs with Nipper.
Who said analyzing firewalls and network devices was something tedious and cumbersome?Well your p...
In the second part of this post I am going to point out a top ten list of ideas andconcepts that ...
Part 1 of a 2 part series Physical security is probably one of the most misunderstood aspects o...