(ISC)2 FREE Half-Day CAP® Credential Clinic
/
0 Comments
(ISC)2 is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers with Gold Standard certifications and world class training.
What is Two-Factor Authentication?
It is an authentication process where two of three recognized factors are used to identify a user:
Something you know - usually a password, passcode, passphrase or PIN.
Something you have - a cryptographic smartcard or token, a chip enabled bank card or an RSA SecurID-style token with rotating digits
Something you are - fingerprints, iris patterns, voice prints, or similar
The C.I.A. Triad or C.I.A. Triangle and Other Security Concepts
Information security is the method of providing confidentiality, integrity and availability to data, information, applications and equipment for those who needs it. The key concept to providing such a level of protection falls on the concept of The C.I.A. triangle which consist of:
– Confidentiality
– Integrity
– Availability
Blackhole Suspect Arrested in Russia
Russian authorities have arrested a man believed to be responsible for distributing a notorious software kit known as "Blackhole" that is widely used by cybercriminals to infect PCs, according to a person familiar with the situation.
Beware of fake ‘Obamacare’ sites that want to steal your info
President Barack Obama's health care reform law kicks in Oct. 1, and cybercriminals, along with health care providers, are standing by, only too eager for you to share your personal information.
Adobe says customer info, source code hacked
Adobe Systems said on Thursday it was the victim of sophisticated cyberattacks on its networks by hackers who accessed data belonging to millions of customers along with the source code to some of its popular software titles.
Information Security Strategy: Stop Punishing End Users
For many years, companies have focused their security efforts on implementing rules to lock down the end user. I learned the hard way that this strategy doesn't necessarily lead to better security.
National Cyber Security Awareness Month
October is National Cyber Security Awareness Month and it is an opportunity to engage public and private sector stakeholders – especially the general public – to create a safe, secure, and resilient cyber environment. Everyone has to play a role in cybersecurity. Constantly evolving cyber threats require the engagement of the entire nation — from government and law enforcement to the private sector and most importantly, the public.
Snowden documents reveal: NSA gathers U.S Citizens’ Social Connections’ data
Snowden documents reveal: NSA gathers U.S Citizens’ Social Connections’ data
WordPress 3.7 Beta 1
For WordPress 3.7 we decided to shorten the development cycle and focus on a few key improvements. We plan to release the final product in October, and then follow it in December with a jam-packed WordPress 3.8 release, which is already in development. Some of the best stuff in WordPress 3.7 is subtle — by design! So let’s walk through what we’d love for you to test, just in time for the weekend.
