Groups
Groups
Sign in
Groups
Groups
Corporate Information Security
Conversations
About
Send feedback
Help
Corporate Information Security
1–30 of 142
Mark all as read
Report group
0 selected
Carlos
5/10/10
NIST Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Recommendations from the National Institute of Standards and Technology on protecting PII data;
unread,
NIST Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Recommendations from the National Institute of Standards and Technology on protecting PII data;
5/10/10
Carlos
9/7/09
The 10 Most Dangerous Risks to Microsoft Security
Thought this was a good read and refresher... http://images.globalknowledge.com/wwwimages/
unread,
The 10 Most Dangerous Risks to Microsoft Security
Thought this was a good read and refresher... http://images.globalknowledge.com/wwwimages/
9/7/09
Carlos
9/7/09
Top 5 Security Tips for 2009
Thought this was worth the read... http://i.zdnet.com/whitepapers/
unread,
Top 5 Security Tips for 2009
Thought this was worth the read... http://i.zdnet.com/whitepapers/
9/7/09
Carlos
7/18/09
Good Cookie Security Resource
An Insight into Cookie Security http://www.infosecwriters.com/text_resources/pdf/
unread,
Good Cookie Security Resource
An Insight into Cookie Security http://www.infosecwriters.com/text_resources/pdf/
7/18/09
INTXHR
6/3/09
Information Security Analyst Opening in Northern Virginia
Responsibilities: • Review security configuration and installation of firewall, VPN, routers, IDS
unread,
Information Security Analyst Opening in Northern Virginia
Responsibilities: • Review security configuration and installation of firewall, VPN, routers, IDS
6/3/09
3133...@gmail.com
4/26/09
Software Assurance Maturity Model (SAMM) 1.0 Released
SAMM is an open framework to help organizations formulate and implement a strategy for software
unread,
Software Assurance Maturity Model (SAMM) 1.0 Released
SAMM is an open framework to help organizations formulate and implement a strategy for software
4/26/09
3133...@gmail.com
4/26/09
ProxyStrike (Web Application Proxy for Finding Vulnerablites)
ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while
unread,
ProxyStrike (Web Application Proxy for Finding Vulnerablites)
ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while
4/26/09
3133...@gmail.com
4/26/09
Watcher version 1.1.2 Released (Web Security Testing and Auditing)
Watcher is a runtime passive-analysis tool for HTTP-based Web applications. It detects Web-
unread,
Watcher version 1.1.2 Released (Web Security Testing and Auditing)
Watcher is a runtime passive-analysis tool for HTTP-based Web applications. It detects Web-
4/26/09
3133...@gmail.com
4/26/09
winAUTOPWN (auto hacking shell for Pentesting)
WINDOWS AUTOPWN or winAUTOPWN is an auto (hacking) shell gaining tool that can be used to test IDS,
unread,
winAUTOPWN (auto hacking shell for Pentesting)
WINDOWS AUTOPWN or winAUTOPWN is an auto (hacking) shell gaining tool that can be used to test IDS,
4/26/09
3133...@gmail.com
4/26/09
Pangolin Updated to 2.0.1.799 (SQL Automated Injection Tool)
Pangolin is an automatic SQL injection penetration testing tool developed by NOSEC. Its goal is to
unread,
Pangolin Updated to 2.0.1.799 (SQL Automated Injection Tool)
Pangolin is an automatic SQL injection penetration testing tool developed by NOSEC. Its goal is to
4/26/09
3133...@gmail.com
4/26/09
PTF (Penetration Testing Framework) 0.54 released
The PTF (Penetration Testing Framework) enumerates the stages one's should perform during a test
unread,
PTF (Penetration Testing Framework) 0.54 released
The PTF (Penetration Testing Framework) enumerates the stages one's should perform during a test
4/26/09
3133...@gmail.com
4/26/09
Microsoft Log Parser 2.2
Log parser is a powerful, versatile tool that provides universal query access to text-based data such
unread,
Microsoft Log Parser 2.2
Log parser is a powerful, versatile tool that provides universal query access to text-based data such
4/26/09
3133...@gmail.com
3/27/09
FREE HP SWFScan (Flash App Vulnerability Scanner)
HP SWFScan, a free tool developed by HP Web Security Research Group, will automatically find security
unread,
FREE HP SWFScan (Flash App Vulnerability Scanner)
HP SWFScan, a free tool developed by HP Web Security Research Group, will automatically find security
3/27/09
3133...@gmail.com
3/4/09
Wapiti | Web application vulnerability scanner / security auditor
Wapiti allows you to audit the security of your web applications. It performs "black-box"
unread,
Wapiti | Web application vulnerability scanner / security auditor
Wapiti allows you to audit the security of your web applications. It performs "black-box"
3/4/09
Arjuna Sree Harsha
3/2/09
Direct Client requirement for IBM WebSphere Consultant; Irvine CA; 40-45$/hr
Hi All, This is Arjun from Logic Planet. We have an urgent requirement for one of our direct client,
unread,
Direct Client requirement for IBM WebSphere Consultant; Irvine CA; 40-45$/hr
Hi All, This is Arjun from Logic Planet. We have an urgent requirement for one of our direct client,
3/2/09
3133...@gmail.com
2/28/09
New Report Shows 92 Percent of Critical Microsoft Vulnerabilities are Mitigated by Eliminating Admin Rights
BeyondTrust Analysis of All 2008 Microsoft Security Bulletins Finds Vast Majority of Vulnerabilities
unread,
New Report Shows 92 Percent of Critical Microsoft Vulnerabilities are Mitigated by Eliminating Admin Rights
BeyondTrust Analysis of All 2008 Microsoft Security Bulletins Finds Vast Majority of Vulnerabilities
2/28/09
a.qarta
1/22/09
Beat Downadup/conficker like a pro: My story from the field
Did Downadup/conficker attack your network? I've created a batch file for system administrators
unread,
Beat Downadup/conficker like a pro: My story from the field
Did Downadup/conficker attack your network? I've created a batch file for system administrators
1/22/09
3133...@gmail.com
1/4/09
Sophos Security Threat Report 2009
IT security and control firm Sophos has published its Security Threat Report 2009 examining the
unread,
Sophos Security Threat Report 2009
IT security and control firm Sophos has published its Security Threat Report 2009 examining the
1/4/09
3133...@gmail.com
1/4/09
WITOOL v0.1 Released (SQL Injection GUI Tool)
WITOOL is a SQL Injection GUI tool by DotNET. - Target db : SQL SERVER, Oracle - Retrieve schema : DB
unread,
WITOOL v0.1 Released (SQL Injection GUI Tool)
WITOOL is a SQL Injection GUI tool by DotNET. - Target db : SQL SERVER, Oracle - Retrieve schema : DB
1/4/09
3133...@gmail.com
1/4/09
GTISC Emerging Cyber Threats Report for 2009
On October 15, 2008, the Georgia Tech Information Security Center (GTISC) hosted its annual summit on
unread,
GTISC Emerging Cyber Threats Report for 2009
On October 15, 2008, the Georgia Tech Information Security Center (GTISC) hosted its annual summit on
1/4/09
a.qarta
12/23/08
DNS Changer 2.0
DNS Changer 2.0 (Trojan.Flush.M) is the next –in the wild- variant of this famous malware. Now the
unread,
DNS Changer 2.0
DNS Changer 2.0 (Trojan.Flush.M) is the next –in the wild- variant of this famous malware. Now the
12/23/08
3133...@gmail.com
12/7/08
BlackBerry Security Resources
The BlackBerry® Enterprise Solution is built with corporate data security in mind. It features an end
unread,
BlackBerry Security Resources
The BlackBerry® Enterprise Solution is built with corporate data security in mind. It features an end
12/7/08
3133...@gmail.com
12/3/08
CSIRT Development
The CERT CSIRT development team (CDT) helps organizations to develop, operate, and improve incident
unread,
CSIRT Development
The CERT CSIRT development team (CDT) helps organizations to develop, operate, and improve incident
12/3/08
3133...@gmail.com
12/3/08
Creating a Computer Security Incident Response Team: A Process for Getting Started
Keeping organizational information assets secure in today's interconnected computing environment
unread,
Creating a Computer Security Incident Response Team: A Process for Getting Started
Keeping organizational information assets secure in today's interconnected computing environment
12/3/08
3133...@gmail.com
12/1/08
Build Security In Website
Build Security In (BSI) is a collaborative effort that provides practices, tools, guidelines, rules,
unread,
Build Security In Website
Build Security In (BSI) is a collaborative effort that provides practices, tools, guidelines, rules,
12/1/08
3133...@gmail.com
11/30/08
Windows® Defender
Windows Defender is a free program that helps you stay productive by protecting your computer against
unread,
Windows® Defender
Windows Defender is a free program that helps you stay productive by protecting your computer against
11/30/08
3133...@gmail.com
11/30/08
OCTAVE (Operationally Critical Threat, Asset, and Vulnerability EvaluationSM)
OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability EvaluationSM) is a suite of tools,
unread,
OCTAVE (Operationally Critical Threat, Asset, and Vulnerability EvaluationSM)
OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability EvaluationSM) is a suite of tools,
11/30/08
3133...@gmail.com
11/30/08
Open Source IT Risk Management (SOMAP.org)
One of the main goals of the Security Officers Management and Analysis Project (SOMAP.org) is to
unread,
Open Source IT Risk Management (SOMAP.org)
One of the main goals of the Security Officers Management and Analysis Project (SOMAP.org) is to
11/30/08
3133...@gmail.com
11/30/08
(IN)SECURE Magazine (Issue 19 has just been released)
(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest
unread,
(IN)SECURE Magazine (Issue 19 has just been released)
(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest
11/30/08
3133...@gmail.com
11/30/08
httprint (web server fingerprinting tool)
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately
unread,
httprint (web server fingerprinting tool)
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately
11/30/08