IT Trenches:

March, 2010


March 30, 2010  12:20 PM

Infosec Awareness Training – Phish or no-Phish

Posted by: Troy Tate
infosec, infosec awareness, phishing, security education, social engineering, ssl certificates

In every employee meeting where I have an opportunity to speak about information security, I bring up the topic of phishing. Phishing is one of the biggest threats in information security today. Social engineering seems to be more prevalent, and harder to detect, than ever and we all have to be...

March 29, 2010  2:14 PM

Wireshark Book – Coffee & a Quickie

Posted by: Troy Tate
ethereal, Laura Chappell, network, network analysis, packet analysis, packet capture, protocol analysis, technology reference, wireshark

Laura Chappell,

March 26, 2010  2:20 PM

Microsoft releases the Microsoft Volume Licensing Reference Guide

Posted by: Troy Tate
Microsoft, Microsoft licensing, Microsoft Volume Licensing, software assurance, software licensing

Software licensing is one of the most complex activities that an IT person has to deal with, especially Microsoft licensing. Microsoft has released a Volume...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

March 21, 2010  4:42 PM

Book Review: CISSP Video Mentor by Shon Harris

Posted by: Troy Tate
asymmetric encryption, CISSP, education, encryption, ip-sec, ipsec, OSI model, PKI, Shon Harris, technology training, training, video learning

Shon Harris is a well known author of information security training materials. She is the owner and president of Logical Security. I recently had the opportunity to go through her CISSP Video Mentor course presented by Pearson...

March 17, 2010  8:59 PM

National Research Council Announces Cyberdeterrence Scholarship

Posted by: Troy Tate
cyberattack, cybersecurity, cyberterrorism, cyberthreats, information security, infosec awareness, risk, risk management, security awareness, threat

This is a very interesting call for papers (CFP). The questions of interest section raises some significant security concerns. Maybe you watched some of the US national cybersecurity drill in February. If not, check out my previous blog posting

March 17, 2010  5:09 PM

Google Apps Status Dashboard available

Posted by: Troy Tate
gmail, Google, Google Apps, Google Groups, Google Talk, Postini, service reporting, sla, sla management

Google has an Apps Status Dashboard website where users of Google Apps such as Google Mail, Google Talk and even Postini services can see current service status. This replaces the previous dashboards or stoplight service reporting...

March 12, 2010  4:47 PM

Dept of Homeland Security announces National Cybersecurity Awareness Campaign Challenge

Posted by: Troy Tate
crisis management, cybersecurity, Department of Homeland Security, dhs, education, information security, information security awareness, risk management, security awareness, training

Maybe you heard about the cybersecurity drill ran last month by the Department of Homeland Security. If not, check out this CNN news story. Then watch the very interesting videos of the drill itself. [kml_flashembed movie="" width="425" height="350"...

March 4, 2010  7:29 PM

Verizon releases security incident metrics framework – VerIS

Posted by: Troy Tate
framework, information management, information security, infosec, lessons learned, Metrics, risk management, security metrics, threat mitigation, vulnerability management

Last month Verizon released a publicly available version of the Verizon...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: