Home > Topics > Security

Security

Memorial Day Sale: Save up to 55% Off

Articles

Vulnerability and pentesting are both effective ways to check the status of your organization's security posture. In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the three basic steps of vulnerability assessments and the proper use of penetration testing.

Your business just had an information security incident--now what do you do? In this video excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the difference between business continuity and disaster recovery plans, how to create them, and when to implement them.

The authors of Security in Computing, 5th Edition discuss the changes they have made to their well-regarded book in the fifth edition.

Randy Nash

Information security expert Randy Nash discusses the history and techniques involved in phishing attacks, looking at some possible reasons why we're still getting caught by obvious phishing attempts.

See More Security Articles

Blogs

Brad Yale

This will be a quick post about the changing times and how, with the purchase of a large-scale media company, the death of free speech is ever nearing.

John  Traenkenschuh

Traenk mulls over his ethical hacking job and remote access technologies. Does user convenience make unseen threats more real?

John  Traenkenschuh

No matter what the need, few security organizations are as dedicated to helping us InfoSec Pros as SANS.

John  Traenkenschuh

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

See More Security Blogs