Vulnerability and pentesting are both effective ways to check the status of your organization's security posture. In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the three basic steps of vulnerability assessments and the proper use of penetration testing.
Your business just had an information security incident--now what do you do? In this video excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the difference between business continuity and disaster recovery plans, how to create them, and when to implement them.
The authors of Security in Computing, 5th Edition discuss the changes they have made to their well-regarded book in the fifth edition.
Information security expert Randy Nash discusses the history and techniques involved in phishing attacks, looking at some possible reasons why we're still getting caught by obvious phishing attempts.
New Mac OS X Means New Tricks...
Wow, who abducted our Windows 10 assumptions and left this smooth running and easy-to-use Operating System in their place?
The Cloud is mighty! All Hail the Cloud, The Slayer of PCs!
Windows 8 was envisioned as a desktop OS capable of fighting the consumers' fling with Tablets. Now that the war is against Tablets AND PC's, can Windows 10 draw consumers to it?