In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou introduces himself and discusses what he will cover in his 5-hour information security video course.
Security issues directly impact IT, networks, and software development. In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses why all technical personnel should have a basic understanding of information security.
Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
In this chapter from Thinking Security: Stopping Next Year's Hackers Steven M. Bellovin asks if the general-purpose firewall is still worth its capital, operational, and productivity cost. He also takes a look a intrusion detection systems, intrusion prevention systems, and extrusion detection systems.
As 2015 winds down to a close, I reflect on what 2015 brought IT.
New Mac OS X Means New Tricks...
Wow, who abducted our Windows 10 assumptions and left this smooth running and easy-to-use Operating System in their place?
The Cloud is mighty! All Hail the Cloud, The Slayer of PCs!