Quantcast
Channel: IT Security – Adventures in the programming jungle
Browsing latest articles
Browse All 19 View Live

Image may be NSFW.
Clik here to view.

(My) CISSP Notes – Security Operations

Note: This notes were made using the following books: “CISPP Study Guide” and “CISSP for dummies”. Operations Security is concerned with threats to a production operating environment. So operations...

View Article



Image may be NSFW.
Clik here to view.

(My) BruCON 2015 notes (1)

Here are my quick notes from the BruCON 2015 conference.All the slides can be found here. Nightmares of a Pentester The goal is to present some (basic) that the operational security teams (a.k.a Blue...

View Article

Image may be NSFW.
Clik here to view.

(My) BruCON 2015 notes (2)

Here are my quick notes from the BruCON 2015 conference.All the slides can be found here. cve-search a free software to collect search and analyze common vulnerabilities and exposures in software Some...

View Article

Image may be NSFW.
Clik here to view.

(My) BruCON 2015 notes (3)

Here are my quick notes from the BruCON 2015 conference. All the slides can be found here. Intrusion detection on Linux and OSX with osquery osquery goals: explore your operation system using sql host...

View Article

Image may be NSFW.
Clik here to view.

(My) BruCON 2015 notes (4)

Here are my quick notes from the BruCON 2015 conference. All the slides can be found here. Crowdsourced Malware Triage Workshop – Making Sense of Malware with a Browser and a Notepad The malware is...

View Article


Image may be NSFW.
Clik here to view.

(My) BruCON 2015 notes (5)

Here are my quick notes from the BruCON 2015 conference. All the slides can be found here. This is the last ticket about the BruCOn 2015 so, it contains the presentations for which my notes are not so...

View Article

Image may be NSFW.
Clik here to view.

Threat Modeling for mere mortals

This ticket is an introduction to the threat modeling in the context of software development. Definition In the context of the IT security, threat modeling is a structured approach that enables you to...

View Article

Image may be NSFW.
Clik here to view.

Book review: Software Security: Building Security in – Part I: Software...

This is a review of the first part of the Software Security: Building Security in book. Chapter 1: Defining a discipline This chapter lands out the landscape for the entire book; the author presents...

View Article


Image may be NSFW.
Clik here to view.

Book review: Software Security: Building Security in – Part II: Seven...

This is a review of the second part of the Software Security: Building Security in book. Chapter 3: Introduction to Software Security Touchpoints This is an introductory chapter for the second part of...

View Article


Image may be NSFW.
Clik here to view.

Book review: Software Security: Building Security in – Part III: Software...

This is a review of the third part of the Software Security: Building Security in book. This part is dedicated to how to introduce a software security program in your company; it’s something that I’m...

View Article
Browsing latest articles
Browse All 19 View Live


Latest Images