By Almantas, the founder and CTO of Demyo, CISSP, GSNA, GSEC, CEH, MCDST, MCP, Net+ and Sec+
First things first, detecting system intrusion its not the same as Intrusion Detection System/Intrusion Prevention System (IDS/IPS). We want to detect system intrusion once attackers passed all defensive technologies in the company, such as IDS/IPS mentioned above, full packet capture devices with analysts behind them, firewalls, physical security guards, and all other preventive technologies and techniques. Many preventing technologies are using blacklisting  most of the time, and thus that’s why they fail. Blacklisting is allowing everything by default, and forbidding something that is considered to be malicious. So for attacker it is a challenge to find yet another way to bypass the filter. It is so much harder to circumvent a whitelisting system.
Fault Tolerant Network Design
By Casey Walters, a network technician for an IT services provider in the Southwest Michigan area. A senior at Davenport University
Whether you’re building a brand new network or looking for ways to improve the resiliency of your existing infrastructure, the following guide is intended to give some tips on how to minimize the effects of failures within the network. This guide explains configuration for primarily Cisco equipment, but a lot of these same principles and protocols can be used with other vendor equipment.
Experimenting with dynamic programming in C#
By Claudio Varini, holds a Phd in computer science, works mainly with Microsoft technologies, in particular Dot.Net, C# and WPF (Windows Presentation Foundation)
An interview with Anthony Giallombardo, the founder of Mafia Security
My name is Anthony Giallombardo and I am the owner of Mafia Security. I am an Information Security Enthusiast belonging to ISSA, Internet Society, and various local user groups in Grand Rapids Michigan. I am finishing my bachelors degree at Davenport University, NSA Information Assurance Center of Excellence, in Grand Rapids, MI dual majoring in Information and Network Security. I started a student organization in 2009 at Davenport University for Cyber Defense where we compete against other schools in the National Collegiate Cyber Defense Competition…
An Interview with Eran Sagi – Corporate VP Marketing, the representative of TADIRAN Company
Mr. Sagi has over 15 years experience in the Telecommunications Industry. Mr. Sagi joined Tadiran in May 2012 as a VP of Marketing, responsible for the company’s global marketing and Go-to-Market activities. Prior to that Mr. Sagi worked at NICE Systems Ltd. (both in the UK & Israel) where he accrued various executive positions such as the Director of Business Development & Product Management and head of EMEA Customer Services.
Mr. Sagi was responsible for the Public Safety Business Unit P&L, building and maintaining business with global and regional partners, defining Go-to Market and product strategies for each product, region, and vertical market.
Tool Time: SecureBrowsing
By Mervyn Heng, CISSP
The Internet is a dangerous place to venture because it is rife with websites hosting malware and malicious code deployed o compromise your systems. How do you thwart hackers from fulfilling their insidious objectives? Mervyn responds to this question.
Femtocell Attacks and Countermeasures
By Nitin Goplani, a Security Researcher in the Telecom Security domain. Involved in assisting in the implementation of security measures for Fixed/ Mobile Network (2g/3G/LTE)
“Coverage” is a key term for all telecom operators. Providing coverage is always a challenge for them. Day by day mobile users are increasing and because of this growth mobile operators are very constraint for bandwidth. That’s why we are facing coverage problem and sometimes unable to connect to mobile users in emergency. The concept behind this problem is known as cell splitting.
In the article Nitin elaborates on this issue.
Social Engineering: The Single Greatest Threat to Organizational Security
By Terrance J. Stachowski, CISSP, L|PT
This paper examines how social engineering attacks take advantage of normal human behavior and demonstrates the real and present threat that this type of dishonest attack poses. Historical data extracted from Kevin Mitnick’s case, and the “DEFCON 18 Social Engineering Capture-the-Flag (CTF) – How Strong is Your Schmooze” results will be utilized to build this case study. Additionally, this paper will investigate what organizations can do to diminish this threat.
Your Security Program Is Failing: What You Can Do To Save It
By Terrance J. Stachowski, CISSP, L|PT
Developing and maintaining a successful security program, regardless of size, can be a monumental undertaking. If you’ve found yourself in the middle of a failing security program, you’re not alone, but take heart, all may not be lost. This article examines some of the common issues security programs face, and provides solutions on how to get things moving in the right direction.