Not verified. Are you owner ?
sponsored links

SANS Information, Network, Computer Security Training, Research, Resources

Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.

Popularity
 
5.0 out of 5 by PressAboutUs
Icons
Reviewed on Jun 7st, 2015
  • Press about sans.org

  • sans.org writes about

  • Social about sans.org

Do you know new review about this site?
Suggest a new review!
  •  

    prnewswire.com Control System Security Researchers Adam Crain and Chris Sistrunk to Unveil New... -- BETHESDA, Md., Dec. 19, 2013 /PRNewswire-USNewswire/ --

    At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. ( www.SANS.org ) SOURCE SANS Institute More by this Source Visit PR Newswire for Journalists fo... Read article

    Relevance
     
    Find useful? Yes
  •  

    secureworks.com The 20 Critical Security Controls | Dell SecureWorks

    More info on the CCA and the Controls, including the complete list, can be found at www.SANS.org . This lists 10 of the 20 Critical Controls that can be addressed with Dell SecureWorks services: Control # 4 13 *First Name: *Last Name: *Industry: *What is the biggest security challenge your organi... Read article

    Relevance
     
    Find useful? Yes
  •  

    rit.edu RIT - University Magazine - Fall 2005

    Keep the backup media in more than one location, and ensure that storage media is periodically checked for viruses. Good online sources of information security tips include the SANS Institute ( www.sans.org ); the International Information Systems Security Certification Consortium ( www.cissp.org... Read article

    Relevance
     
    Find useful? Yes
  •  

    itjungle.com The Windows Observer--Applications the Target of Security Attacks, SANS Says

    Another security-related product afflicted with security problems of its own are antivirus scanners. With their deep kernel-level integration with operating systems, vulnerabilities in antivirus software can present an especially pernicious problem. In the last year, flaws have been found in just... Read article

    Relevance
     
    Find useful? Yes
  •  

    owasp.org Testing Guide Introduction - OWASP

    Payne, A Guide to Security Metrics - http://www.sans.org/reading_room/whitepapers/auditing/55.php [3] NIST, The economic impacts of inadequate infrastructure for software testing - http://www.nist.gov/public_affairs/releases/n02-10.htm [4] Ross Anderson, Economics and Security Resource Page - htt... Read article

    Relevance
     
    Find useful? Yes
  •  

    artmantalks.wordpress.com Security « Artman Talks

    Kevin tells us that the goal of security is not to create a perfectly secure environment and explains how that applies to browsers. This week John speaks with Kevin Johnson , consultant at SecureIdeas.net and instructor at SANS Insitute (sans.org). How are botnets created and how are they used? J... Read article

    Relevance
     
    Find useful? Yes
  •  

    blog.coresecurity.com Using the CORE Impact MS Word Web Bug Module « Core Security

    If you want to do something really advanced you can put an agent on a public server and have the HTTPS connection go there and forward that to Impact. There are lots of ways to skin that cat, contact us and we can talk through the options. Anyway if you’ve seen the webcast you know what he was re... Read article

    Relevance
     
    Find useful? Yes
  •  

    sourcesecurity.com SANS London 2012 moves from Docklands to Covent Garden | Security News - SourceSecurity.com

    SANS London 2012, the world’s largest infosec training event outside of the US and will take place at the Grand Connaught Rooms, Covent Garden, London from November 26th – 3rd December. More information can be found at http://www.sans.org/london-2012/ Copyright © Notting Hill Media Limited 2000 -... Read article

    Relevance
     
    Find useful? Yes
  •  

    upenn.edu Penn Information Security: Information for Local Support Providers (LSP)

    In their place we are recommending that support providers and system administrators make use of the excellent tools and checklists (most of them free) available from the Center for Internet Security at their website: www.cisecurity.org . Even though the SANS Step-By-Step Guides are no longer avai... Read article

    Relevance
     
    Find useful? Yes
  •  

    dshield.org Port Details: - Internet Security | DShield

    SANS ISC SANS Site Network Current Site Internet Storm Center Other SANS Sites Help Graduate Degree Programs Security Training Security Certification Security Awareness Training Penetration Testing Industrial Control Systems Cyber Defense Foundations IT Audit Computer Forensics Software Security ... Read article

    Relevance
     
    Find useful? Yes
  •  

    community.spiceworks.com Intro to securing your Firewall. - Spiceworks

    Even though Cisco routers are extraordinarily hard to attack by their fluid design you still need to update them. Firewalls are NOT a set and forget device. New features come out, new security holes are found. Update your firmware regularly. Update yourself as well. This is by far NOT a comprehen... Read article

    Relevance
     
    Find useful? Yes
  •  

    itknowledgeexchange.techtarget.com Security Corner Page 77

    Surprisingly, the SANS article made no mention that the Ponemon survey found that 65% of the travelers who have confidential or sensitive information on their laptops do nothing to attempt to protect it. The article seems to be more focused on physical security and this is indicative of a paradig... Read article

    Relevance
     
    Find useful? Yes
  •  

    blog.econocom.com Targeted attacks: it only happens to other people | E-media, the Econocom blog

    Look at the bigger picture Despite basic precautions such as firewalls, compliance and closer tracking of events logs, cyber attacks are on the rise. According to IT security consultant Lenny Zeltser, a member of the SANS institute, an American company specialising in IT security training, such t... Read article

    Relevance
     
    Find useful? Yes
  •  

    news.cnet.com Security groups call for education, alert systems - CNET News

    "Today's announcement is the equivalent of national leaders telling every driver to wear football pads and helmets and tie themselves to the seat backs, because the automobile manufacturers won't build in seat belts and air bags and better bumpers, and because there are a lot of dangerous drivers... Read article

    Relevance
     
    Find useful? Yes
  •  

    fastcoexist.com A Tiny City Built To Be Destroyed By Cyber Terrorists, So Real Cities Know What's Coming | Co.Exist | ideas + impact

    It’s still that, but adding to that, it’s now people hacking into computers to cause real-world physical damage.” The threat is changing. It’s now people hacking into computers to cause real-world physical damage. He’s talking about power blackouts, derailed trains, airport control towers run amo... Read article

    Relevance
     
    Find useful? Yes

Twitter about sans.org

Facebook about sans.org

Get weekly email alerts

Follow sans.org

Get every new review delivered to your Inbox.