Security Tools

DNSChanger Malware

Original Post Published by the US-CERT In November 2011, U.S. Federal prosecutors announced Operation Ghost Click, an investigation that resulted in the arrests of a ring of seven people who allegedly infected millions of computers with DNSChanger malware. The malware ma...

Web Application Security Reviews

According to the National Vulnerability Database and nCircle VERT (Vulnerability and Exposure Research Team), Web application vulnerabilities have increased from 1.9% of all published vulnerabilities in 2006 to over 52% in 2009. Meanwhile, even seemingly “benign sites” li...

Are You the Weakest Link?

I just got off the phone with Dan after he spent the last couple of days at the Indiana Bankers Association’s IT Security Conference. He said it went great! Lots of good information and wonderful speakers. Long story short: I’m a multi-tasker. So, while di...

Security Culture Maturity Assessment

Establishing a Security Culture . . . Which is it, the chicken or the egg? Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . My curious question is this:  Do you have enough of a security culture to talk your managem...

Mark Your Calendars: IBA IT Security Conference

Mark your calendars! The Indiana Bankers Association has scheduled their annual Information Technology (IT) Security Conference for 2010.   This year’s conference is scheduled for October 13th and 14th.   Details of that event will be coming soon, once they are fi...