Wednesday, November 05, 2008

Anand wins in style! ( Anand 6.5 - Kramnik 4.5 )


Source : http://www.uep-worldchess.com/ ( Torsten Behl )

Wednesday, September 10, 2008

Web Application Security statistics for year 2007

Web Application Security Consortium ( http://www.webappsec.org/ ) released a survey for Web Application Security vulnerabilities for the year 2007. XSS still dominates the arena. Well detailed, worth a read : http://www.webappsec.org/projects/statistics/

Friday, May 30, 2008

the DONs of Security

Here is a list of 15 most influential people in Security compiled by eWeek:

'1. Tavis Ormandy, Google Security Team'
'2. Ivan Krstic, One Laptop Per Child'
'3. Chris Paget, IOActive'
'4. Bunnie Huang, Bunnie Studios'
'5. Michal Zalewski, Google'
'6. Window Snyder'
'7. The MOAB Hackers'
'8. Dino Dai Zovi'
'9. Michael Howard, Microsoft'
'10. HD Moore, Metasploit '
'11. Dave Aitel, Immunity'
'12. Bronwen Matthews, Microsoft'
'13. John Pescatore, Gartner'
'14. Rob Thomas and Team Cymru'
'15. Stefan Esser, Hardened PHP Project'

The original article can be found at :
http://www.eweek.com/c/a/Security/The-15-Most-Influential-People-in-Security-Today/

Friday, February 08, 2008

CISSP Preparation : Plan and Efforts

Preparing for CISSP:
Here are my two words, might help for your CISSP prep.

My Date :
April 2005

Changes Since :
A new topic on Application Security has been added into the 10 domains

Time :
4 to 6 months

Books Covered :
1] ISC2 Official Guide for CISSP ( 1st Priority )
( http://www.amazon.com/Official-ISC-Guide-CISSP-Press/dp/0849382319/ref=sr_1_1/104-1441772-1525525?ie=UTF8&s=books&qid=1202456055&sr=1-1 )
2] Shon Harris
( http://www.amazon.com/CISSP-Certification-All-One-Guide/dp/0071497870/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1202456103&sr=1-1 )
3] Wiley - CISSP Prep Guide ( good as aux. info, can do without it )
( http://www.amazon.com/CISSP-CAP-Prep-Guide-Platinum/dp/0470007923/ref=sr_1_3?ie=UTF8&s=books&qid=1202456134&sr=1-3 )
4] cccure.org ( Good to cover corner concepts, limited use cosidering actual exam questions )
( http://www.cccure.org/ )
5] Hal Tipton - Information Security Management Handbook ( Awesome resource - only if you have >= 6 months )
( http://www.amazon.com/Information-Security-Management-Handbook-CD-ROM/dp/1420060457/ref=sr_1_3/104-1441772-1525525?ie=UTF8&s=books&qid=1202456055&sr=1-3 )
6] Michael Overly Guide ( for last 15 days )
( http://www.cccure.org/ )

Study Plan :
Would recommend giving a serious 4-6 months of dedicated effort, completing the ISC2 official guide first. Then Shon Harris, and then the rest if time permits. Prepare in a group. For the last 15 days refer Michael Overly.

All the best.


My Favorite Topics :

Cryptography
Application Security
Telecommunication and Network Security
Physical Security

Thursday, January 10, 2008

XSS Hu la la :-)

From Mark Curphey's blog ::

"

From the Office of "Real World Software Security"

When a customers development team was recently asked to use the AntiXSS library, validate input and encode output for their web interface they replied (and I quote) “we do not use cross site scripting”.

If any customer ever asks the single most effective thing to affect a positive change on their software security security program I always respond with education and awareness. Pound for pound, dollar for dollar it is the most effective tool anyone has.


"