Blog Posts - It Security



SQL Hacking – Hackerangriffe erkennen, abwehren und Datenbanken schützen

SQL Hacking  – IT-Security: SQL-Injection auf relationale Datenbanken lernen und verstehen Haar, München,  12.05.2016 – Mit „SQL-Hacking: SQL-Injection auf relationale Datenbanken im Detail lernen, verstehen und abwehren„ ...
by PRService-Wenzel on May 12, 2016

Businesses Turn Their Backs on Banks That Lack the Right IT Security

Over two-thirds of companies prefer to bank with a provider who has a solid security reputation, according to a Kaspersky Lab survey. Those banks that make security a priority and take every effort to......

Lowongan Kerja Bank Jatim Terbaru Februari 2016

Lowongan.Terbaru.co.id - Haai sahabat terbaru.co.id ... Apakah kamu masih belum mempunyai pekerjaan? sudah mencari-cari kesana kemari namun masih belum dapat juga, kini tidak perlu khawatir lagi sobat. Bank Jatim atau PT. Bank Pembangunan Daerah Jawa...
by Lowongan Kerja Terbaru on Feb 5, 2016

RECRUITMEN BNI - ODP Information Technology,Januari 2016

Bank Negara Indonesia (BNI) adalah bank komersial tertua dalam sejarah Republik Indonesia. PT.Bank Negara Indonesia Tbk didirikan pada tanggal 5 Juli tahun 1946 oleh Margono Djojohadikusumo, yang... BACA SELENGKAPNYA...
by LokerBandaAceh on Dec 31, 2015

How Anti-Spam Filters Could Improve HIPAA Compliance

  Do you deal with sensitive health care information in your office? You may be a doctor, lawyer, massage therapist or even a supplier to a hospital.… The post How Anti-Spam Filters Could Improve HIPAA Compliance appeared first on Vircom I...
by Email Security Matters on Oct 19, 2015

Security Jobs: Senior IT Security Analyst, Sacramento, CA, Relocation Available

Senior IT Security AnalystStatus: Newly Created PositionLocation: Sacramento, CARelocation: SomeCompensation: $100,000+ SecurityRecruiter.com has been engaged to build an Information Security and IT Risk Management team.  This role contribu...

Trending, Informative & Inspiring Techbiz IT Seminars 2015

Hello Monday! I’m looking forward for Friday. There are so many reasons to be happy beacuse we are going to have a long weekend, Merdeka holiday plus Malaysia IT Fair is starting 28th till 31st August at Mid Valley Convention Center. This year IT F...
by Sunshine Kelly on Aug 24, 2015

Using Risk Management Standards: A Q&A with Ben Tomhave, Security Architect and Former Gartner Analyst

By The Open Group IT Risk Management is currently in a state of flux with many organizations today unsure not only how to best assess risk but also how to place it within the context of their business. Ben Tomhave, … Continue reading →...
by The Open Group Blog on Jun 19, 2015

Survey Shows Organizations Are Experiencing an Identity Crisis When it Comes to IT Risk Management

By Jim Hietala, VP, Business Development & Security, The Open Group Last fall, The Open Group Security Forum fielded its first IT Risk Management Survey in conjunction with the Society of Information Risk Analysts (SIRA) and CXOWARE The purpose o...
by The Open Group Blog on Apr 17, 2015

Risk, Security and the Internet of Things: Madrid 2015 Preview

By Jim Hietala, Vice President, Business Development & Security, The Open Group The Internet of Things (IoT) is a fast evolving phenomenon. From smartphones and tablets to connected cars and industrial control systems, the number of IoT devices i...
by The Open Group Blog on Apr 13, 2015

Enabling the Boundaryless Organization the Goal of The Open Group Madrid Summit 2015

The Open Group, the global vendor-neutral IT consortium, is hosting its latest event in Madrid April 20 – 23 2015. The event is set to build on the success of previous events and focus on the challenge of building a … Continue reading →...
by The Open Group Blog on Mar 25, 2015

Udemy – Hacking School & IT Security Academy’s Professional Hacking Training

Description: Over 30 lectures and 6 hours of content. Application attacks and how to prevent them. Application security assessment. Global management of user software. Cryptography and cryptanalysis. Symmetric and asymmetric encryption. Public key in...
by tutgfx on Mar 25, 2015

when making my CISSP knowledge meet my Cisco knowledge

CISSP tip of the day(where making my CISSP knowledge meet my Cisco knowledge) : OS Kernels have two basic designs: monolithic and microkernel. A monolithic kernel is compiled into one static executable and the entire kernel runs in supervisor mode.Al...

New CISSP Changes Comparing to Current One

Anonymous writes “ Good day to all, I have started to look in details at the new CBK® coming into effect on f15th of April 2015. The new CBK® list a bit more than 109 references used within the CBK.   This list is always a great indicator...

Cybersecurity Standards: The Open Group Explores Security and Ways to Assure Safer Supply Chains

Following is a transcript of part of the proceedings from The Open Group San Diego 2015 in February. The following presentations and panel discussion, which together examine the need and outlook for Cybersecurity standards amid supply chains, are pro...
by The Open Group Blog on Mar 10, 2015

CISSP New Outline (will be change 15 April 2015)

CISSP outline will be change 15 April 2015 New outline here https://www.isc2.org/uploadedfiles/(isc)2_public_content/exam_outlines/cissp-exam-outline-april-2015.pdf  ...

Udemy – It Security Professional Certified Hacking Training (IT Security Hacking Tips & Techniques for IT Professionals)

Description: Over 30 lectures and 6 hours of content. Application attacks and how to prevent them. Application security assessment. Global management of user software. Cryptography and cryptanalysis. Symmetric and asymmetric encryption. Public key in...
by tutgfx on Nov 11, 2014

Security Advisory 3010060 released

Today, we released Security Advisory 3010060 to provide additional protections regarding limited, targeted attacks directed at Microsoft Windows customers. A cyberattacker could cause remote code execution if someone is tricked into opening a malicio...
by The WSUS Support Team blog on Oct 21, 2014

Open FAIR Blog Series – Five Reasons You Should Use the Open FAIR Body of Knowledge

By Jim Hietala, VP, Security and Andrew Josey, Director of Standards, The Open Group This is the second in our blog series introducing the Open FAIR Body of Knowledge. In this blog, we provide 5 reasons why you should use … Continue reading ...
by The Open Group Blog on Oct 15, 2014

Open FAIR Blog Series – An Introduction to Risk Analysis and the Open FAIR Body of Knowledge

By Jim Hietala, VP, Security and Andrew Josey, Director of Standards, The Open Group This is the first in a four-part series of blogs introducing the Open FAIR Body of Knowledge. In this first blog. we look at what the … Continue reading →...
by The Open Group Blog on Sep 30, 2014


Trending Topics

Close