Friday, September 4, 2015
Posted by manager
Reader's rate:
0
Contributed by LoyCurtis Smith As a network is expanded and more users are granted access to a company’s resources, more extensive measures are required to protect an enterprise from someone obtaining unauthorized access to those resources as well as company secrets. One of the most important... + continue reading
Friday, September 4, 2015
Posted by manager
Reader's rate:
0
Contributed by Hitch Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While these are old topics and articles, they are still a top hit on ISW today. Contents from this blog... + continue reading
Thursday, September 3, 2015
Posted by manager
Reader's rate:
0
Contributed by Hitch Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While these are old topics and articles, they are still a top hit on ISW today. Contents from this blog... + continue reading
Thursday, September 3, 2015
Posted by manager
Reader's rate:
0
Contributed by Mark Wollerman The following research topic looks at different approaches to securing the enterprise network. In this topic we will discuss the best practices that can bring additional security to the enterprise network. In today’s network enterprise attacks can be more... + continue reading
Wednesday, September 2, 2015
Posted by manager
Reader's rate:
0
Contributed by Lamaris Davis Securing EHR’s continue to be a huge problem for all health care organizations. The security of this highly sensitive information will continue to be a short and long term goal for every organization that deals with healthcare information. Authentication of the... + continue reading

Home Page

Featured Articles

Thursday, 03/09/15 - 0 comment(s)
Contributed by Hitch Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While these are old topics and articles, they are still a top hit on ISW today. Contents from this blog included Exploitation of Buffer Overflow... + continue reading
Tuesday, 01/09/15 - 0 comment(s)
Contributed by Charles Hornat This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest information free and open for the taking, usually requiring little to no effort to obtain. In my company’s experience (over a decade) of supporting... + continue reading

Red Tape

338
reads
3 today
Wednesday, 02/09/15 - 0 comment(s)
Contributed by Lamaris Davis Securing EHR’s continue to be a huge problem for all health care organizations. The security of this highly sensitive information will continue to be a short and long... + continue reading

Cryptography

306
reads
4 today
Monday, 31/08/15 - 0 comment(s)
Contributed by Roberto Larcher This paper explains how it is often possible, with the simple substitution of a string, to get around a "secure" implementation based on an incorrect use of SSL.... + continue reading

Exploitation

229
reads
32 today
Friday, 04/09/15 - 0 comment(s)
Contributed by Debasis Mohanty The objective of this article is to demonstrate different possible ways that viruses and worms coders use to evade any Anti-Virus products while coding malicious... + continue reading

Sistema

544
reads
5 today
Thursday, 27/08/15 - 0 comment(s)
Contributed by Anoop MS The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an... + continue reading

Et Cetera

254
reads
30 today
Friday, 04/09/15 - 0 comment(s)
Contributed by Hitch Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While... + continue reading

Recommended Reading

979
reads
12 today
Thursday, 30/07/15 - 0 comment(s)
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine... + continue reading