Information about general information security issues.

I’ve Been Hacked – What To Do After You’ve Been Hacked

/
By Carter Graydon at Hacked.com There’s nothing quite…

Mitigating Buffer Overflow Attacks in Linux/Unix

/
A buffer overflow is the most common and the most serious threat to Linux/Unix operating systems. Buffer overflows occur when code running in unprotected memory in a buffer overwrites memory in an adjacent location.

Information Commissioner Calls for Regulation of Social Media Following Cambridge Analytica scandal

/
Information commissioner calls for regulation of social media following Cambridge Analytica scandal

UK’s Information Commissioner’s Office (ICO) Slap Fines on Facebook and Equifax

/
Facebook was fined £500,000 by the UK's Information Commissioner’s Office (ICO) for its role in the Cambridge Analytica data scandal.

Continuous Monitoring : Academic Paper

/
The Federal Information Security Act (FISMA) of 2002 requires that government agencies report on their Information Technology Security Status annually to the Office of Management and Budget (OMB).

UK needs to talk to China to ensure cybersecurity

/
As the UK’s cybersecurity situation becomes more uncertain and vulnerable day by day, top cyber intelligence officers have spoken out about seeking alternative arrangements to ensure a more protected digital environment across the country.

National Cybersecurity Career Awareness Week

/
The National Cybersecurity Career Awareness Week (NCCAW), brought to you by the National Initiative for Cybersecurity (NICE), is a week-long campaign focused on increasing awareness about careers in cybersecurity and building a national cybersecurity workforce to enhance America’s national security and promote economic prosperity.

Complementing a Security Management Model with the 20 Critical Security Controls: Academic Paper

/
The complexity and velocity of the threats organizations are facing are only escalating and there is a definite need for careful analysis of the attack trends to determine effective mitigations.

Attack Overview – Video

/
There are generally two reasons an individual or an organization is attacked. One, you are specifically targeted or two, you are a target of opportunity.

How-to Display a Warning Banner Before the Login Prompt

/
It is best to have a warning banner displayed before a user is logged in. Below is how you will implement this task.