Author Archives: zigurds

Technical Guide to Information Security Testing and Assessment by NIST, Special Publication 800-115

One of the  many NIST guidelines that can help to assess, analyze and develop IT security strategies in organization is to use NIST’s Special Publication 800-115 Technical Guide to Information Security Testing and Assessment Recommendations of the USA National Institute … Continue reading

Posted in IT Security, Week 38 | Leave a comment

Example of IT Risk Assessment Report

For some time we have been looking on the National Institute of Standards and Technology (NIST) 800-30, “Risk Management Guide for Information Technology Systems” guidelines. So you don’t have to invent new wheel, I have found example of IT Risk … Continue reading

Posted in IT Security, Week 37 | Leave a comment

20 Critical Security Controls by SANS

The most trusted and the largest source for information security training and security certification in the world SANS institute brings guidelines of 20 Critical Security Controls for Effective Cyber Defense. For those who don’t know SANS Institute was established in … Continue reading

Posted in IT Security, Week 36 | Leave a comment

Wifi security and cracking WPA/WPA2 with help of GPU

For a time I was wondering how secure is my router and can someone crack my WPA2 password. There a lot of tools for WEP cracking and WPA/WPA2, WEP can be cracked really fast by using one of many tools … Continue reading

Posted in IT Security, Week 21 | Leave a comment

Iris recognition gadget eliminates passwords

I am still searching for solution for passwordless access in my system and all those many many web pages 🙂 solution is maybe there. But do I want to spend 99$ on it, that’s the question? Designed by the Hoyos … Continue reading

Posted in IT Security, Week 20 | Leave a comment

Fight phishing with education

In today’s information age people tend to use more and more electronic services substituting old one, like not going to bank any more, shopping online and do everything from their homes. Yes, this is very convenient but also very dangerous. … Continue reading

Posted in IT Security, Week 19 | Leave a comment

Sandboxing vs Virtual machine

Some while ago I was in search for solution for secure browsing and for way to securely execute some untrusted programs downloaded from internet in secure manner. There are a lot of recommendation how to stay safe on internet, like … Continue reading

Posted in IT Security, Week 18 | 1 Comment