Penetration Testing - A Hands-On Introduction to Hacking by Georgia Weidman is 528 pages long and was published by No Starch Press in June 2014. This book is a beginner's guide to performing penetration tests. Penetration testing is a service provided by security researchers to organizations wishing to evaluate their defenses. Georgia Weidman documents the process from start … [Read more...]
Using CompTIA’s free IT Security Assessment Wizard
Last week, CompTIA announced a free-for-registered users IT Security Assessment Wizard in a press release. I decided to try it out and see if it would be of any value to evaluate my clients and provide them the report. To access the IT Security Assessment Wizard, you must sign in with a CompTIA account. If you don't have one, you can register and use the Wizard … [Read more...]
Keybase embraces social networks for cryptography
Public key encryption is based on two keys, a public key and a private key. To send someone an encrypted message, you must find the recipient's public key which would allow them to decrypt the message with their private key, something only they know. Keybase aims to help PKI by taking advantage of social networks, places where people are already pushing their identities. By … [Read more...]
October is National Cyber Security Awareness Month
October is National Cyber Security Awareness Month, coordinated by the Department of Homeland Security. Every October since 2004, National Cyber Security Awareness Month—administered by the Department of Homeland Security (DHS)—reminds us of the importance of protecting not only our individual identities, finances, and privacy but also our country’s national security, critical … [Read more...]
Free e-book: Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies
Published in July by the Center for a New American Security, Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America's Cyber Dependencies by Richard J. Danzig describes the cyber security of the nation's infrastructure. It concludes with 8 recommendations for steps that America needs to take in order to improve its security and its cyber security … [Read more...]