Et Cetera

Tue
26
Jul

Effective Vulnerability Management Using Qualysguard

Contributed by Boyd Aaron Sigmon

In the Information Security field, being proactive is often better than being reactive, especially when it comes to the ever-growing vulnerabilities in today’s software and operating systems. In order for an organization to be proactive, implementing an effective vulnerability management program is a necessity and can drastically reduce the amount of risk and incidents associated with cyber security attacks.

This document is in PDF format. To view it click here.

Wed
20
Jul

Introduction to Cisco Firepower Threat Defense

Contributed by Jeff Dixon

Information Security is akin to a never ending cat and mouse game, it’s rapid pace makes it one of the fastest evolving areas in technology. Every day, new vulnerabilities and new solutions are created. This paper will discuss Cisco’s Next Generation Firewall technology that has evolved to help defend against new and emerging threats. While many solutions exist, the focus for this paper will be on Cisco’s newest unified Firepower Threat Defense (FTD) image running on their Adaptive Security Appliance (ASA).

This document is in PDF format. To view it click here.

Thu
14
Jul

Fog Computing and the Internet of Things

Contributed by Albert Dominguez V

Mon
27
Jun

Geo-fencing Technologies and Security

Contributed by William Jason Haddock

The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates the strengths, weaknesses, opportunities, and threats associated. The author includes more information about implementing a geo-fence within a wireless network and the methodology used to contain, fingerprint, and allow mobility of secure data across a network. Geo-fencing is shaping our world and information security professionals need to develop strategies for it in regard to information assurance.

This document is in PDF format. To view it click here.

Mon
27
Jun

Rise of Robotics

Contributed by Demonte Harris

Security, a key aspect of assuring that important things are kept safe, is evolving daily. According to the National Information Systems Security Glossary, information security is defined as “the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats” (University). The question is, to what extent is too far when it comes to the privacy of the individuals who need this information to be protected?

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera