SANS Information Security Reading Room 25 Computer Security Papers added to the Reading RoomKohanaPHPPractical El Jefe"El Jefe is a free situational awareness tool that can drastically reduce the costs for securing your enterprise by making locating and responding to advanced threats incredibly easy." (Immunity Inc., n.d.).Tue, 31 Mar 2015 00:00:00 +0000Enabling Large-Scale Mobility with Security from the Ground Up SANS Analyst Program infographic based on the whitepaper, Enabling Large-Scale Mobility with Security from the Ground Up. It offers a graphical interpretation of the paper's keytakeaways and supplemental data.Mon, 30 Mar 2015 00:00:00 +0000Enabling Large-Scale Mobility with Security from the Ground Up SANS Analyst Program whitepaper written by Jaikumar Vijayan and advised by SANS Analyst G. Mark Hardy. It discusses the state of enterprise mobility and the challenges posed to information technology groups by the massive influx of personal and corporate-owned mobile devices in the workplace in recent years.Mon, 30 Mar 2015 00:00:00 +0000Correctly Implementing Forward Secrecy the heart of Forward Secrecy is the use of the Diffie-Hellman key exchange.Mon, 30 Mar 2015 00:00:00 +0000Using Sysmon to Enrich Security Onion's Host-Level Capabilities 2003, Gartner declared Intrusion Detection Systems as a “market failure” primarily because of the high false positives and negatives, and the significant amount of time and resources needed to monitor and validate alerts.Fri, 27 Mar 2015 00:00:00 +0000Finding Evil in the Whitelist security controls, such as antivirus and intrusion detection systems, can be generally classified as blacklisting technologies.Tue, 24 Mar 2015 00:00:00 +0000Minimizing Damage From J.P. Morgan's Data Breach did a mega bank like J.P. Morgan get hacked? It all started in June 2014 when one of their employee's personal computer was infected with malware which resulted in stolen login credential (Sjouwerman, 2014).Tue, 17 Mar 2015 00:00:00 +0000Web Application Firewalls years, attackers have assailed networks and exploited system level vulnerabilities, fueling demand for products like firewalls and intrusion detection systems.Mon, 16 Mar 2015 00:00:00 +0000Data Breach Preparation Depot experienced the second largest data breach on record. ("Home Depot data breach affected 56M debit, credit cards", 2014) It started in April 2014, but Home Depot did not become aware of the problem until September 2 when law enforcement and some banks contacted them about signs of the compromise.Mon, 16 Mar 2015 00:00:00 +0000Powercat started as a proof-of-concept tool that I initially developed.Wed, 04 Mar 2015 00:00:00 +0000Automation in the Incident Response Process: Creating an Effective Long-Term Plan the right resources in place, attackers can be detected more accurately and efficiently, mitigating damage and data loss from inevitable network attacks. This paper presents a proper process and procedure for incident response that includes the use of automation tools.Wed, 04 Mar 2015 00:00:00 +0000Sleeping Your Way out of the Sandbox term Advanced Persistence Threat is widely cited as originating in 2006 from the US Air force in reference to advanced cyber-attacks against specific targets (Fortinet, 2013, p2).Tue, 03 Mar 2015 00:00:00 +0000What Every Tech Startup Should Know About Security, Privacy, and Compliance everyone has what it takes to launch a successful tech startup. A compelling vision must propel the founder, fueled by unstoppable passion.Wed, 25 Feb 2015 00:00:00 +0000Windows Phone 8 Forensic Artifacts of the fast pace of change of mobile device technologies and operating systems, there are times when a newer mobile device which is unsupported or only partially supported by commercial mobile forensic tools for data extraction and parsing must be examined in the course of a criminal investigation, with the end goal being the extraction of digital evidence for use in court.Fri, 20 Feb 2015 00:00:00 +0000Exercise - Not Just for Your Body Anymore programs have been publicized and encouraged for a long time as a way to keep your physical and mental abilities in shape. Fri, 20 Feb 2015 00:00:00 +0000Palo Alto Firewall Security Configuration Benchmark security configuration benchmark was created and tested against Palo Alto Networks' PAN-OS 6.1 software.Fri, 20 Feb 2015 00:00:00 +0000Open Source IDS High Performance Shootout early as 1972, the U.S. Air Force was becoming increasingly aware of computer security problems (Bruneau, 2001).Tue, 17 Feb 2015 00:00:00 +0000Who's Using Cyberthreat Intelligence and How? the last several years, we've seen a disturbing trend-attackers are innovating much faster than defenders are. We've seen the "commercialization" of malware, with attack kits available on underground forums for anyone who wants to perpetrate a variety of attacks.Mon, 16 Feb 2015 00:00:00 +0000Monitoring Baselines with Nagios is 4:00 on a Friday afternoon and you, a system administrator for a large, multinational entertainment company, are putting your things away to head out for a long holiday weekend.Thu, 12 Feb 2015 00:00:00 +0000Enhancing Intrusion Analysis through Data Visualization, companies are required to sift through large volumes of relevant data in order to meet their governance, risk, compliance and security needs.Thu, 12 Feb 2015 00:00:00 +0000The Role of Static Analysis in Heartbleed security vulnerabilities known as Common Vulnerabilities and Exposures (CVEs), have been on the rise since the United States Computer Emergency Readiness Team (US-CERT) began tracking them in 1999.Thu, 12 Feb 2015 00:00:00 +0000NetFlow Collection and Analysis Using NFCAPD, Python, and Splunk is a traffic summary technology developed by Cisco systems. While intended as a management and auditing tool for networking professionals, NetFlow data can be a valuable resource for security analysts.Tue, 10 Feb 2015 00:00:00 +0000An Analysis of Gameover Zeus Network Traffic September of 2011, a peer-to-peer variant of Zeus emerged on the internet (Symantec, 2014). Mon, 09 Feb 2015 00:00:00 +0000Using the PMBoK Framework on Small Business IT Projects managing information technology (IT) projects is a complex endeavor. Project management frameworks might seem overreaching or incompatible with some of the characteristics common to small organizations, like multi-function employees and smaller budgets.Mon, 09 Feb 2015 00:00:00 +0000The Integration of Information Security to FDA and GAMP 5 Validation Processes reviewing the failures of information security (InfoSec) through the lifecycle management of information systems within the pharmaceutical industry, analysis starts with the governing validation process for the qualification of information systems.Thu, 05 Feb 2015 00:00:00 +0000