Source: National Cyber Security – Produced By Gregory Evans Position Description -Works within Forensic Lab environment under ASCLD/Lab accreditation quality management system. -Conducts forensic analysis of digital evidence to include workstations, servers and mobile devices. -Works eDiscovery requests for electronically stored information (ESI) -Data analytics and review -Thoroughly documents The…
Australia still has a way to go to become an infosec world leader
Source: National Cyber Security – Produced By Gregory Evans Australia is far from the largest cybersecurity marketplace in the world, but that hasn’t stopped Prime Minister Malcolm Turnbull from having soaring ambitions of Australia becoming a leader in both the Asia-Pacific and internationally. As part of his national innovation The…
He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.
Source: National Cyber Security – Produced By Gregory Evans He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums…
January 29 – 30, 2015-ISSA CISO Executive Forum: InfoSec and Legal Collaboration
Source: National Cyber Security – Produced By Gregory Evans Powered by Max Banner Ads Developing and Connecting Cybersecurity Leaders Globally Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in…
Top 5 #infoSec Reads June 23-30
by Matt Piscitello Snowden-inspired anonymity software, wearables security, remote control software for iOS and Android, Luuuk campaign affected by Tovar, and GoZ plays Lazarus are this weeks top 5 #infosec reads. Edward Snowden inspired anonymity software, OnionShare, launches Promising massive file sharing across the TOR network with complete privacy, Micah…
WurldTech met the inabilities by infosec to GE
To overcome the inabilities of infosec, the GE has settled with Wurldtech to recover its in-house potential. The Wurldtech is the brand selling under the name of Achilles along with the test suite and firewall software. With the test tube suite, the hardware is designed to test the control system…
NJVC and InfoSec Institute partner to provide cyber security training services
Top Priority Sector: security_services Information technology solutions provider NJVC, of Chantilly, VA, and information security training company InfoSec Institute, have announced a partnership to provide cyber security training services. NJVC can now implement federal government and military formal training programs that fall under DoD 8570 training mandates. Homepage position: 1…
Top 5 #infosec reads: February 17-21, 2014
by Matt Piscitello Wireless threat detection, exploiting routers to phish bank web sites, enterprise-ready iOS7, healthcare information protection, and mobile device management top this week’s list of infosec-worthy reads. The importance of live threat data Lisa Phifer discusses the importance of live threat detection and prevention. Lisa explains that while…
Must Read for Infosec Pros: Rich Mogull on Apple Security Strategy
You may have missed this jewel of an infosec post by Rich Mogull amid the hashtag avalanche of NSA, PRISM, or FISA articles last week. Rich’s post, Apple Security Strategy: Make It Inivisible, impressed me as shedding light on singularly important design objectives that all information security efforts ought to…
TheHackersNews: #Anonymous : We Are Not Terrorists but Fearless Freedom Fighters http://t.co/v13GImLI #Security #infosec
TheHackersNews: #Anonymous : We Are Not Terrorists but Fearless Freedom Fighters http://t.co/v13GImLI #Security #infosec View full post on Twitter / TheHackersNews View full post on National Cyber Security