packetboyperseus.blogspot.com
Packet Boy Perseus: February 2010
http://packetboyperseus.blogspot.com/2010_02_01_archive.html
Monday, February 15, 2010. It's like an SQL Injection attack, trying this one now on my VoIPSec lab. Time to fix those Asterisk cookbooks guys! Exten = X.,1,Dial(SIP/${EXTEN}@testsip). He writes: “. And if ${EXTEN} = “ 000@testsip&SIP/333. 8221; what turns out to happen. Then is similar to SQL injection. Complete technical details here: http:/ www.voip-forum.com/? Sunday, February 14, 2010. CloudAudit A6 - The Audit, Assertion, Assessment, and Assurance API. For someone involved in the Cloud Computing in...
packetboyperseus.blogspot.com
Packet Boy Perseus: Making the Cloud Trustworthy
http://packetboyperseus.blogspot.com/2010/04/making-cloud-trustworthy.html
Wednesday, April 7, 2010. Making the Cloud Trustworthy. Yet another Cloud Security initiative, http:/ www.trusted-cloud.com/. Is an initiative by pioneer computer networking company Novell. Mission Statement: To Promote Education, Research and Certification of Secure and Interoperable Identity in the Cloud. We just don't have the solid security framework yet to manage and implement effective IT controls. Which is what the guys at http:/ www.cloudaudit.org. And http:/ cloudsecurityalliance.org/. Elcome to...
denniskuntz.com
awareness – Dennis Kuntz
http://denniskuntz.com/blog/tag/awareness
Just Another Information Security Blog. Does a CISO’s Reporting Structure Matter? In his post on CSOOnline. My good friend Michael Santarcangelo. Makes a solid argument for CISO’s to have certain skills to overcome any perceived issues with reporting structure. The skills Michael describes are:. Focus on advancing top priorities. Establish and demonstrate value. For the most part, I agree. That being said, and while I agree that the skills described are definitely. Important), and I’ll even admit that so...
packetboyperseus.blogspot.com
Packet Boy Perseus: April 2010
http://packetboyperseus.blogspot.com/2010_04_01_archive.html
Wednesday, April 7, 2010. Making the Cloud Trustworthy. Yet another Cloud Security initiative, http:/ www.trusted-cloud.com/. Is an initiative by pioneer computer networking company Novell. Mission Statement: To Promote Education, Research and Certification of Secure and Interoperable Identity in the Cloud. We just don't have the solid security framework yet to manage and implement effective IT controls. Which is what the guys at http:/ www.cloudaudit.org. And http:/ cloudsecurityalliance.org/. It detect...
rationalsurvivability.com
Rational Survivability » Career
https://www.rationalsurvivability.com/blog/category/career
Hoff's Ramblings about Information Survivability, Information Centricity, Risk Management and Disruptive Innovation. Presos & Papers. Archive for the ‘Career’ Category. On building fire extinguishers and fighting fires…. June 1st, 2015. I have met amazing people across the globe and the shared perspective of collaborating and co-creating solutions with such a diverse group of people has blown my mind. At the same time, the nature of society, humanity and the way in which our industry has dramatically shi...
cloudsecurity.dk
Cloud Security DK
http://www.cloudsecurity.dk/mig
Information om Cloud Security. Mit navn er Carsten Jørgensen. Jeg har arbejdet med sikkerhed fuld tid siden 1999 hvor jeg blev ansat som penetrationstester i Neupart and Munkedal. Senere kendt som Vigilante. Derefter arbejdede jeg som manager i KPMG IT Risk Management. Og som Senior IT Sikkerhedskonsulent i Devoteam Consulting. Jeg arbejder i dag som it-sikkerhedschef i Falck. Jeg er bl.a. CIPP/E. Certificeret og har haft en række andre certificeringer som CISSP. Som ekstern lektor siden 2010. 27januar 2...
cloudsecurity.dk
Cloud Security DK
http://www.cloudsecurity.dk/mere-eller-mindre-sikkert
Information om Cloud Security. Cloud Computing - mere eller mindre sikkert? Det store spørgsmål lige nu er selvfølgelig hvad Cloud Computing gør ved it-sikkerheden. Bliver it-sikkerheden bedre eller svagere med Cloud Computing? Sikkerheden kan blive højere end den er i dag med en Cloud løsning. En Cloud leverandør kan f.eks. potentielt tilbyde reduntante systemer, høj tilgængelighed, hærdede virtuelle maskiner, sikre konfigurationer som default, segmenterede net, kryptering osv, osv. Med en bedre forståe...