Who’s the Hacker?

Before the era of cybercrime, hacking for social, political, or religious causes (so-called hacktivism), and terrorist threats to our infrastructure and monetary systems, the hacker started as an explorer and traveler on the data superhighway. Today, we can still categorize some hackers as explorers. In fact, the title “hacker” carried the pejorative meaning only recently.

Read more

Certified Ethical Hacker v8: Network Defense on the Offense

The majority of information security education emphasizes the definition and application of best practices. First, a network or system administrator needs to understand the proper application and configuration of network and security devices: routers, switches, firewalls, intrusion detection/prevention systems, and honeypots. A good start with strong IT policies facilitates the implementation.

Read more

What You Need to Know about Asset Protection

In order to protect your assets, you must first know what they are, where they are, and how they are tracked and managed. Are they secured? Who has access to them? Who tracks and manages them? Do you have functional procedures in place to respond and recover from a security breach quickly? Do you have a process improvement cycle to prevent re-occurrence?

Read more