Author Archive

ISACA Advanced Persistent Threat Awareness Study

ISACA has released a very interesting report on Advanced Peristent Threats (APT) where they partnered with Trend Micro to provide insight into the phenonenon. The report includes information on such areas as: the geographic distribution of attacks, comparison of APTs vs. traditional threats, enterprise ability to deal with APT-type…

Read More

Security Battleground an Executive Field Manual – Good Read!

Just read a fantastic new book called Security Battleground an Executive Field Manual. The book was given to me by a friend at McAfee. It was written by a group of folks at McAfee responsible for Technicat Opertations, and Consulting.
Here is a quick synopsis of the book: Security has…

Read More

Threats to our Critical Infrastructure

Our Industrial Controls Systems (ICS) are threatened.  On Face the Nation, Page 2 (http://www.cbsnews.com/video/watch/?id=50140746n), February 10, 2013, James Lewis, Senior Fellow from the Center for Strategic and International Studies describes the threats to our utilities.  Lewis continues describing that the largest threats are…

Read More

Supercharge your SIEM!

Many organizations out there, big and small are running SIEMs (Security Information and Event Management) solutions. There are many providers out there: HP ArcSight, IBM Q1 Radar, Splunk, McAfee Nitro and so on. I think they are invaluable in an organization trying to monitor what is going on at any…

Read More

HTCIA CISO Summit

The HTCIA is organizing a CISO Summit in Summerlin, NV on September 12, 2013 to coincide with its International Conference and Training Expo. The agenda is still being finalized. You can expect some of the following topics during the event:

The challenge of cyber security in the enterprise
Understanding the…

Read More

Does DLP Actually Work?

With the state of information security today, organizations are looking to implement defensive systems to protect against breaches, but more specifically to protect against their precious data being ex-filtrated from their network. Data Loss Prevention or DLP is being deployed more and more to solve this problem. There are…

Read More

Members Only Forums

We have made available a new discussion forums application to HTCIA members. We have created numerous forums to group together like-content. For example, there are forums discussing computer forensics, information security, mobile forensics, etc. The forums provides threaded discussions, e-mail notifications when there are replies to your posts…

Read More