- 5 Steps to Building and Operating an Effective Security Operations Center (SOC)
-
By
Joseph Muniz
- Dec 21, 2015
- Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
|
- An Overview of Computer Security
-
By
Matt Bishop
- Jan 3, 2005
|
- Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
-
By
Ron Fuller, David Jansen, Matthew McPherson
- Apr 26, 2013
- This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.
|
- Developing Network Security Strategies
-
By
Priscilla Oppenheimer
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
- Information Flow
-
By
Matt Bishop
- Jan 3, 2005
|
- Information Security Principles of Success
-
By
Jim Breithaupt, Mark S. Merkow
- Jul 4, 2014
- This chapter introduces these key information security principles and concepts, showing how the best security specialists combine their practical knowledge of computers and networks with general theories about security, technology, and human nature.
|
- IPv6 Internet Security for Your Network
-
By
Eric Vyncke, Scott Hogg
- Jun 4, 2009
- This chapter covers how to secure your network when it is connected to the IPv6 Internet.
|
- Network Security First-Step: Firewalls
-
By
Donald Stoddard, Thomas M. Thomas
- Feb 8, 2012
- This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
|
- Open Source Tools for Security Testing
-
By
Michael Kelly
- Sep 16, 2005
- Michael Kelly reports on handy security uses for four open source tools: WebGoat, Firefox Web Developer, WebScarab, and Ethereal. By combining the tools in easy ways, testers can track down and close the gaping security holes that are often left in applications.
|
- Overview of Security Operations Center Technologies
-
By
Joseph Muniz, Nadhem AlFardan, Gary McIntyre
- Dec 15, 2015
- This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
|
- Secure By Design? Techniques and Frameworks You Need to Know for Secure Application Development
-
By
Randy Nash
- Dec 19, 2012
- What do you know about developing secure robust software? Randy Nash discusses several available techniques and frameworks for secure application development.
|
- Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
-
By
Ron Fuller
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES-128 bit encryption on your Cisco Nexus 7000 series switches.
|
- Software [In]security: A Software Security Framework: Working Towards a Realistic Maturity Model
-
By
Gary McGraw, Brian Chess
- Oct 15, 2008
- Gary McGraw and Brian Chess introduce a software security framework (SSF) to help understand and plan a software security initiative.
|
- Software [In]security: Attack Categories and History Prediction
-
By
Gary McGraw
- Aug 25, 2009
- Software security expert Gary McGraw describes how to divide attacks into four categories — and predict the attacks of tomorrow.
|
- Software [In]security: Balancing All the Breaking with some Building
-
By
Gary McGraw
- Aug 30, 2011
- Security expert Gary McGraw argues that the software security industry is favoring offense at the expense of defense, and that more proactive defense is needed.
|
- Software [In]security: BSIMM Begin
-
By
Gary McGraw, Sammy Migues
- Sep 24, 2009
- Gary McGraw introduces BSIMM Begin, a Web-based study focused on 40 of the 110 activities covered in the full Building Security In Maturity Model.
|
- Software [In]security: BSIMM Europe
-
By
Gary McGraw, David Harper, Matias Madou, Florence Mottay
- Nov 10, 2009
- Security expert Gary McGraw and team introduce BSIMM Europe and compare some of its initial results to the original BSIMM data.
|
- Software [In]security: BSIMM versus SAFECode and Other Kaiju Cinema
-
By
Gary McGraw, Sammy Migues
- Dec 26, 2011
- Gary McGraw and Sammy Migues clarify the intended use of the Building Security In Maturity Model (BSIMM) and compare it to the SAFECode Practices methodology.
|
- Software [In]security: BSIMM2
-
By
Gary McGraw, Brian Chess, Sammy Migues, Elizabeth Nichols
- May 12, 2010
- Gary McGraw and colleagues discuss the latest iteration of the Building Security In Maturity Model, BSIMM2.
|
- Software [In]security: BSIMM3
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Sep 27, 2011
- BSIMM3 is the third iteration of the Building Security In Maturity Model (BSIMM) project, a tool used as a measuring stick for software security initiatives in the corporate world. Gary McGraw describes the BSIMM3 along with Brian Chess and Sammy Migues.
|