
Even Thor Couldn’t save “Blackhat”
/
0 Comments
Let’s face it here, the term “Blackhat” is related to hacking but it’s clear they didn’t have anybody on the set that knew what that meant

Obama to Announce Cybersecurity Plans in State of the Union Preview
Obama to Announce Cybersecurity Plans in State of the Union Preview

Delayed or Slow SSH Connection on Mac OS X Systems Fix
Delayed or Slow SSH Connection on Mac OS X Systems


What’s Needed for a Successful Information Security Policy?
What's Needed for a Successful Information Security Policy?

Complementing a Security Management Model with the 20 Critical Security Controls
Complementing a Security Management Model with the 20 Critical Security Controls

The Three General Categories of Policies
The three general categories of policies involved with information security are: (a) general or security program policies, (b) issue-specific security policies, and (C) system-specific security policies.

The U.S. Military Classification Scheme
The U.S. military classification scheme relies on a more complex five-level classification scheme as defined in Executive Order 12958. This posting will list the classifications and briefly describe each of them.

The Four Basic Strategies to Controlling Risks
An organization must choose four basic strategies to control risks such as risk avoidance, risk transference, risk mitigation and risk acceptance. Below these for basic strategies are explained in detail.

Dozens of Chinese Held in Kenya ‘Cyber Bust’ Dozens
At the beginning of the month, the Kenyan Police located 77 Chinese…