Infosec Blogs/Podcasts

Internet Infrastructure in 5 Minutes

May 6, 2014
By
Filmstrip

Next networking class I teach is going to start with this video… Hopefully after these 5 minutes everyone will get the gist and we can just move on to some of the more fun stuff. The only thing I could have wished for was more puppy pictures.   With the speed of an auctioneer...
Read more »

Tags: , , ,
Posted in Infosec Blogs/Podcasts | 3 Comments »

Top 5 SOC Analyst Skills

April 14, 2014
By
SOC Analyst Candidates

Similar to an article we covered before on training your SOC analysts, Rick Howard recently penned this one detailing what to look for when initially recruiting that staff. The leading sentence pretty much summarizes it all — emphasizing “passion, experience, and communication skills” while downplaying certifications and degrees. And of course you get what...
Read more »

Tags: , , , ,
Posted in Infosec Blogs/Podcasts | 6 Comments »

More Malware Analysis Tools

February 27, 2014
By
More Malware Analysis Tools

I’ve probably mentioned some of these tools before in other articles and presentations but what I really like about this post over at Journey Into Incident Response is that two of the tools are from those in the local NoVA area. Their contributions include Noriben by @bbaskin and Automater by @tekdefense. Rounding out the post’s selection...
Read more »

Tags: , , ,
Posted in Infosec Blogs/Podcasts | 6 Comments »

DoD Approved 8570 Baseline Certifications

February 20, 2014
By
Certifications

I unfortunately find myself having to reference the approved certifications for DoD 8570 a lot lately. Instead of searching for it each time, I thought I would just post it here as a quick reference for myself and any others out there. I don’t necessarily agree with the DoD placing so much importance on...
Read more »

Tags: ,
Posted in Infosec Blogs/Podcasts | 5 Comments »

What Is Homomorphic Encryption?

December 11, 2013
By
What Is Homomorphic Encryption?

I was listening to an older episode of Risky Biz (282) where they were discussing the concept of homomorphic encryption and how it can be applied to secure cloud computing. Basically, this type of operation involves performing computing operations on data while its encrypted rather than having to decrypt it first. It’s obvious to...
Read more »

Tags: ,
Posted in Infosec Blogs/Podcasts | 6 Comments »

Do You SQRL?

December 10, 2013
By
Do You SQRL?

Just curious what everyone thinks about this new Security Quick Reliable Login (SQRL) authentication protocol Steve Gibson introduced early last month. Originally standing for Secure QR Login, the initial login process involves snapping a picture of a QR code on a site’s authentication page using a SQRL app. The app and the website authenticate...
Read more »

Tags: , , , ,
Posted in Infosec Blogs/Podcasts | 4 Comments »

(ISC)2 Announces BoD Election Results

December 9, 2013
By
(ISC)2 Announces BoD Election Results

Just wanted to close out our coverage of the (ISC)2 Board of Directors election for this year… Late last week (ISC)2 announced the results of this recent election. Although it doesn’t look like the write-in campaign had the desired effect, its organizer Jennifer Minella did win one of the five board seats. Congrats to...
Read more »

Tags: , ,
Posted in Infosec Blogs/Podcasts | 1 Comment »

When Quantum Cryptography Isn’t Cryptography

December 4, 2013
By
When Quantum Cryptography Isn’t Cryptography

by Hal F. A  research company recently built a secure enterprise network using quantum key distribution. This “quantum encrypted” network is presented as entirely new, but it’s not.  DARPA has funded a functioning quantum encrypted research network and demonstration systems have been running in Europe for some years. There is also intense research in...
Read more »

Tags: , , ,
Posted in Infosec Blogs/Podcasts | 9 Comments »

CISSPs, Let Your Vote Count by this Saturday for (ISC)2 BoD

November 28, 2013
By
Vote Now for BoD

I know our minds are elsewhere right now with most of us having a few days off and enjoying time with family and friends but don’t forget that we are right in the middle of (ISC)2 Board of Directors voting season. And the polls close out on sort of an odd day … this...
Read more »

Tags: , , ,
Posted in Infosec Blogs/Podcasts | 6 Comments »

Free Dead-Simple Remote Access for Helping Friends & Family

November 26, 2013
By
Being Family Tech Support

As an infosec professional I often find myself being the goto tech support person for family and friends. Providing help isn’t that bad when I’m local but trying to talk someone through fixing a problem remotely is just a huge pain as I am sure most of you have experienced. So for a while...
Read more »

Tags: , , , , , , ,
Posted in Infosec Blogs/Podcasts | 4 Comments »


About Us

Founded in 2008, NoVA Infosec is dedicated to the community of Metro DC-based security professionals and whitehat hackers involved in the government and other regulated verticals. Find out more on our About Us page.