Last Day to Save $300 on 4-6 Day Cyber Security Courses at SANS Cyber Defense Initiative® in Washington, DC!

SANS Security Trend Line: Category - Critical Controls

Are You Preparing for Your GIAC Exam? Try These Top 10 Indexing Tips

Are you taking your GIAC certification and looking for hints and tips on how to pass your cyber security exam? Read on to discover how you can give yourself the best chance of passing. Continue reading Are You Preparing for Your GIAC Exam? Try These Top 10 Indexing Tips


Cyber Security and the Importance of Continuous Training

With cyber-attacks now said to be the fourth most serious global concern, we look into the importance of cyber security training and of keeping skills fresh and up to date, through the eyes of the individual and the organisation. Continue reading Cyber Security and the Importance of Continuous Training


Twelve Word Tuesday: Mobile Users Are Not Trying to Break Out of App Store Jail

____________________________________________________________________________ Only .56% of iOS devices jailbroken, Android headed there. Users prefer AppStores. Data source: SkyCure 2016 Mobile Threat Intelligence Report Continue reading Twelve Word Tuesday: Mobile Users Are Not Trying to Break Out of App Store Jail


Twelve Word Tuesday: Can App Security Consultants Recover and "John Henry" Managed Bug Bounty Programs?

Too many low-value, cookie-cutter app testing engagements enabled bug bounty programs' success. (Explanation of John Henry reference here.) Continue reading Twelve Word Tuesday: Can App Security Consultants Recover and "John Henry" Managed Bug Bounty Programs?


Progress in Using the Critical Security Controls to Sort Out "Security Bad Apples"

In the past six months or so, there has been a lot of forward movement in state and federal government around the idea of screening suppliers and contractors for "basic security hygiene" as embodied in the Critical Security Controls. Most importantly, new federal procurement regulations will go into effect June 15th that directly require contractors … Continue reading Progress in Using the Critical Security Controls to Sort Out "Security Bad Apples"