SANS Information Security Reading Room 25 Computer Security Papers added to the Reading RoomKohanaPHPRisky Business Management has evolved just like many other aspects of IT Security.Tue, 08 Jul 2014 00:00:00 +0000Incident Response in a Microsoft SQL Server Environment Response in a Microsoft SQL Server environment starts with planning and requires the Intelligence approach.Thu, 03 Jul 2014 00:00:00 +0000Wireshark: A Guide to Color My Packets Responders investigating technology-facilitated crime in an unfamiliar or even non-homogenous network environment can be given access to raw packet trace files.Thu, 03 Jul 2014 00:00:00 +0000Web Application Penetration Testing for PCI Verizon 2014 Data Breach Investigations Report reported 3,937 total web application related incidents, with 490 confirmed unauthorized data disclosures (Verizon, 2014). Thu, 26 Jun 2014 00:00:00 +0000Designing and Implementing a Honeypot for a SCADA Network paper is based on a facilities network filled with Supervisory Control and Data Acquisition (SCADA)-type devices, controlling and monitoring everything from elevators, to pumps, to generators, to smart meters, to building access control systems. Fri, 20 Jun 2014 00:00:00 +0000Advanced Network Protection with McAfee Next Generation Firewall,firewalls/advanced-network-protection-mcafee-generation-firewall-35250A review of McAfee Next Generation Firewall by SANS Analyst and Senior Instructor Dave Shackleford. It explores a number of the product's capabilities, including clustering and redundancy, numerous varieties of VPN access, policy options and features such as end-user identification and advanced anti-evasion toolsThu, 19 Jun 2014 00:00:00 +0000Higher Education: Open and Secure?, 16 Jun 2014 00:00:00 +0000Practical Threat Management and Incident Response for the Small- to Medium-Sized Enterprises you work in a small- to medium-sized enterprise (SME),1 you know how challenging securing your technology assets can be.Thu, 12 Jun 2014 00:00:00 +0000A guide to leading and motivating highly driven professionals project is defined as "a temporary endeavor undertaken to create a unique product, service or result."Fri, 06 Jun 2014 00:00:00 +0000Securing Aviation Avionics the safety of the flying public, the majority of security research does not directly target the primary flight instruments Tue, 03 Jun 2014 00:00:00 +0000A Journey into Litecoin Forensic Artifacts is a virtual peer-to-peer currency.Tue, 03 Jun 2014 00:00:00 +0000An Opportunity In Crisis the cliche saying goes, 'The Chinese word for Crisis contains a symbol for Opportunity'.Tue, 03 Jun 2014 00:00:00 +0000Security Analytics: having fun with Splunk and a packet capture file (pcap) Analytics is one of the most discussed topics within the Information Security (IS) industry, especially when combined with another buzzword such as Big Data. Fri, 30 May 2014 00:00:00 +0000Intrusion Analysis Using Windows PowerShell during the late 90s and through the turn of the millennium was not held in high regard in terms to security.Fri, 30 May 2014 00:00:00 +0000iPwn Apps: Pentesting iOS Applications growth of mobile device usage in both personal and professional environments continues to grow. Mon, 12 May 2014 00:00:00 +0000Cybersecurity Professional Trends: A SANS Survey,securitytrends/cybersecurity-professional-trends-survey-34615Survey results on evolving roles of security professionals worldwide, including new roles, titles, managerial functions, and existing and planned certifications broken out by industry and geography.Thu, 08 May 2014 00:00:00 +0000SAMHAIN: Host Based Intrusion Detection via File Integrity Monitoring paper will focus on the installation and configuration of Samhain in a client / server architecture with some specific compile and runtime options explored.Tue, 06 May 2014 00:00:00 +0000Automation of Report and Timeline-file based file and URL analysis proposed solution tries to lessen the burden of manually processing timeline-based logfiles and automating the classification of both files and URLs.Tue, 06 May 2014 00:00:00 +0000Incident Handling Annual Testing and Training and the annual costs incurred by business are on the rise year over year.Tue, 29 Apr 2014 00:00:00 +0000Combining Security Intelligence and the Critical Security Controls: A Review of LogRhythm's SIEM Platform,logging/combining-security-intelligence-critical-security-controls-review-logrhythm-039-s-si-34610Review of LogRhythm’s security information and event management (SIEM) platform with new security intelligence features built in for compliance.Wed, 23 Apr 2014 00:00:00 +00002014 Trends That Will Reshape Organizational Security,securitytrends/2014-trends-reshape-organizational-security-34625Information for security managers to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.Tue, 22 Apr 2014 00:00:00 +0000Skype and Data Exfiltration software packages have been as controversial, yet as ubiquitous as Skype.Mon, 21 Apr 2014 00:00:00 +0000Rootkit Detection with OSSEC malware consists of a malicious application that gets installed on a victim’s computer. Wed, 16 Apr 2014 00:00:00 +0000The Hacker Always Gets Through early 2010, security analysts started noticing something really interesting. Tue, 15 Apr 2014 00:00:00 +0000Windows ShellBags Forensics in Depth Windows records the view preferences of folders and Desktop.Mon, 14 Apr 2014 00:00:00 +0000