- Career Data Mining Resumes for Computer Attack Reconnaissance
Resumes reveal technologies and version numbers useful for attack reconnaissance—product names, security tools, and infrastructure details. Sites like Indeed allow free, anonymous resume searching....
- Communication One-Year Anniversary of this Blog
- Social Networking Explaining Computer Security Terms to Ordinary People
Technical jargon that security professionals use daily may be meaningless to non-IT people. A collaborative effort with SANS Institute defines commonly-used security terms like firewall, exploit, and...
- Social Networking Twitter Social Networking Among Information Security People
Twitter offers three-fold value for security professionals: discovering curated content (users act as content curators), interacting with peers (social stigmas almost non-existent), and researching...
- Social Networking 11 Security Tips for Online Social Networking
Practical social networking security tips: ignore email links claiming to be from social sites, use HTTPS, periodically deauthorize unused apps, be skeptical of job postings, verify requests for...
- Social Networking Which Apps Are Authorized to Access Your Social Networking Accounts?
Attackers may target less secure third-party apps authorized to access social networking accounts rather than attacking the platforms directly. Periodically review and deauthorize unused apps on...