Tuesday, November 6, 2012

Articles of Interest

Structuring Presentations:
http://blogs.hbr.org/cs/2012/10/structure_your_presentation_li.html#comment-697038595

Saturday, March 31, 2012

Risk Assessment Related Docs

Risk Management Guide for Information Technology Systems http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

INTERNET BANKING AND TECHNOLOGY RISK MANAGEMENT GUIDELINES : http://www.mas.gov.sg/resource/legislation_guidelines/risk_mgt/IBTRMV3.pdf

IT Sector Baseline Risk Assessment - http://www.dhs.gov/xlibrary/assets/nipp_it_baseline_risk_assessment.pdf

IT Governance Models & Good Practice Frameworks http://www.thebci.org/reports/IanInglis.pdf

Sunday, January 24, 2010

Secure Coding Tools

http://www.fortify.com/security-resources/rats.jsp
http://www.dwheeler.com/flawfinder/
http://www.cigital.com/its4/download.php
http://www.securityfocus.com/infocus/1596

Penetration Test Tools

http://www.foundstone.com/us/resources/proddesc/hacmebank.htm
http://www.hackerevolution.org/
http://sectools.org/
http://nmap.org/
http://www.nessus.org/nessus/
http://www.metasploit.com/
http://oss.coresecurity.com/projects/pshtoolkit.htm
http://freeworld.thc.org/thc-hydra/
http://www.oxid.it/cain.html