Application Security Architecture Authentication
CertificationsCorporate ComplianceCryptology
Disaster RecoveryEnterprise SecurityExploits
FirewallsIncident HandlingIntrusion Detection
OS SecurityPolicies and ProceduresSecurity Basics
Security ManagementSecurity ToolsServers
StandardsVoIPVulnerability Management
Web SecurityWiFi SecurityWorms and Viruses

Managing Security Risks in Wireless Networks


by Michelle Sellers

This is 2016 and wireless networks are an important part of the structure in nearly every business. Unfortunately they are also a large vector for attackers to compromise vulnerabilities in a system that hasn’t been secured properly. This whitepaper will discuss the inherent vulnerabilities of a wireless network and ways to manage and mitigate these risks properly.
» Read more

Mobile Device Management

by Michelle Sellers

Mobile device management is an important topic for companies considering the use of a mobile device policy.  There are several vulnerabilities that can be caused from outside sources, not to mention vulnerabilities that come from the inside. McAfee, a leader in antivirus is reporting that the top cyber threats for 2014 are attacks on mobile devices (Gormisky, n.d.). A mobile device that has been attacked can compromise corporate data. Companies need to do the research involved in securing mobile devices before accepting the possibility of “bring your own device” to the workplace.

» Read more

Ethics of Hacking

by Michelle Sellers

This paper will explore the ethics of hacking. There are two main types of hacking, ethical hacking and unethical hacking. For the purposes of this paper I will attempt to explain the differences between the two and argue my viewpoints on the topic. I will support my arguments with valuable resources, and explain how the typical ethical theories pertain to this topic. I will follow with ways to prevent being a victim of the crime of hacking.
» Read more

Disaster Recovery Best Practices

This paper discusses an approach for creating a good disaster recovery plan for a business enterprise. The guidelines are generic in nature, hence they can be applied to any business subsystem within the enterprise.
In the IT subsystem, disaster recovery is not the same as high availability. Though both concepts are related to business continuity, high availability is about providing undisrupted continuity of operations whereas disaster recovery involves some amount of downtime, typically measured in days. This paper focuses only on disaster recovery.
» Read more

Future Privacy and Security Controls

by Michelle Sellers

Technology is moving so quickly, it’s difficult to keep up with the security features that are needed to keep it secure. As a result; after a tool, device, or software are released, there is usually a security patch or several security patches that follow to secure it. Sometimes this security comes a little too late.

The future of technology is heading more towards mobility and ease of use. Employers want their employees to be able to work from anywhere and at any time. The problem with this is that with mobility and ease of use; also come security issues that need to be considered for better privacy and security controls.

» Read more

Best Practices in Mobile Phone Investigations

The field of mobile phone investigation has grown exponentially in recent years. The number of cell phones investigated each year has increased nearly tenfold over the past decade. Courtrooms are relying more on the information inside a cell phone as vital evidence in cases of all types.

Despite that, the practice of mobile phone forensics is still in its relative infancy. Many digital investigators are new to the field and are in search of a simple book that could be titled Phone Forensics for Dummies.

Unfortunately, that book is not available yet—so investigators need to look elsewhere for information on how to best tackle cell phone analysis. This article can help—although by no means should it serve as an academic guide. It can, however, be used as a first step to help an investigator gain a basic understanding in the area.
» Read more

A Proactive Approach to Incident Response

Any incident response has two components that drive overall cost:
1. How long does it take to detect the intrusion after the attackers first gain access?
2. Once detected, how quickly can the incident be remediated?
Finding a solution that addresses both questions with satisfactory answers is the job of any organization that cares about saving costs and protecting data. In today’s security environment, though, separating the important signal from the noise is one of the bigger challenges incident responders face.
» Read more

1 2