Information Security Blog
Click here to check out the top news in information security and leave your comments.
These are articles written for the benefit of the InfoSec community. Feel free to use these and publish them on your website or blog as long as you include a link to this website. This material carries a Creative Commons (CC) Attribution Share Alike CC BY-SA license.
Information Security Interviews and Commentary
I am available for limited public interviews on topics relating to information security. To discuss an interview, you can reach me via the contact page.
Presentation and Interview Archive
Due to venue requests, these are only made available to attendees and other authorized users.
- Designing an Effective Information Security Program
- Embracing the Cloud for Healthcare Providers
- Incident Response Requirements in Healthcare
- Interview with Joshua Spencer: Military Drone Security
- Information Security Leadership Roundtable
- The Biggest Mistake CISO's Make
Information Security Resources
These tools are all malware free, and updated regularly. However, I make no guarantees of this software of any kind. Please see the terms of use contained within the individual tools for further usage and copyright information.
- Network Security Toolkit Live CD
- Wireshark Packet Capture
- Nessus Vulnerability Scanner
- Snort Intrusion Detector
- Kismet WiFi Intrusion Detector / WiFi Auditor
- Network Mapper
- Network Monitor
- Autorun Disabler
- Process Explorer
- Investigate TCP Sessions
- Page File Defragger
- Ram Mapper - Win6+ Only
- Rootkit Detector
- Malware Preventer
- Malcode Runtime Analysis
- Malware Analysis Toolbox
- Malware Scanner
- MalwareBytes Signature Definitions - Nov 2010
- Disk Fragmentation Viewer
- HD to VHD Converter