Security

Ryan Barnett, Director of Application Security Training at Breach Security, Inc.

Ryan Barnett, Director of Application Security Training at Breach Security, Inc. talks with Stephen Northcutt about the current state of web application security.

Categories: Security

Dinis Cruz, Director of Advanced Technology, Ounce Labs

Dinis Cruz, Director of Advanced Technology for Ounce Labs, talks with Stephen Northcutt about the many facets of OWASP, as well as the important questions that need real answers in order to develop secure web applications.

Categories: Security

Brian Chess, Chief Scientist for Fortify Software

Brian Chess, Chief Scientist for Fortify Software, talks with Stephen Northcutt about static analysis and other web application security solutions.

Categories: Security

Caleb Sima, CTO for SPI Dynamics

Stephen Northcutt interviews Caleb Sima about the development of Caleb's company, SPI Dynamics, and the increasing need for solutions for web application security.

Categories: Security

An Interview with David Hoelzer, author of DAD, a log aggregator

An interview with David Hoelzer describing DAD, an open source Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time.

Categories: Security

A Model for Licensing IT Security

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Legal Issues

Paper Added: August 6, 2013

Categories: Security

Discovering Security Events of Interest Using Splunk

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Logging Technology and Techniques

Paper Added: July 17, 2013

Categories: Security

Practical Cyber Security Training Techniques for New IT Support Employees

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Best Practices

Paper Added: July 19, 2013

Categories: Security

Detecting Security Incidents Using Windows Workstation Event Logs

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Logging Technology and Techniques

Paper Added: July 9, 2013

Categories: Security

Security Best Practices for IT Project Managers

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Best Practices

Paper Added: June 24, 2013

Categories: Security

A Practical Social Media Incident Runbook

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Incident Handling

Paper Added: June 20, 2013

Categories: Security

Web Application Injection Vulnerabilities: A Web App's Security Nemesis?

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Categories: Application and Database Security,Securing Code,Security Basics

Paper Added: June 14, 2013

Categories: Security

Electronic Medical Records: Success Requires an Information Security Culture

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Categories: HIPAA,Compliance

Paper Added: June 5, 2013

Categories: Security

Corporate vs. Product Security

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Categories: Best Practices,Incident Handling,Security Policy Issues,Management & Leadership

Paper Added: June 3, 2013

Categories: Security

Securing BYOD With Network Access Control, a Case Study

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Network Access Control

Paper Added: May 23, 2013

Categories: Security

Event Monitoring and Incident Response

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Categories: Incident Handling,Intrusion Detection

Paper Added: May 15, 2013

Categories: Security

Dead Linux Machines Do Tell Tales

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: GIAC Honors Papers

Paper Added: May 15, 2013

Categories: Security

Setting Up a Database Security Logging and Monitoring Program

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Application and Database Security

Paper Added: May 10, 2013

Categories: Security

Managing the Implementation of a BYOD Policy

SANS Information Security Reading Room - Tue, 08/06/2013 - 22:59

Category: Management & Leadership

Paper Added: May 8, 2013

Categories: Security
Syndicate content

eXTReMe Tracker