Incident Response and Forensics
I think I subscribe to every information security mailing list. These lists give me varying levels of details on the bugs and other vulnerabilities that can cause security problems within systems or networks. Some are general while others are run by manufacturers and cater to users of that vendor’s product. Most contain information submitted by users while the rest comes from the manufacturer. I know that the number of mailing lists I am on is overkill to most administrators, but the point is that as I work with my clients, I am kept up to date on the latest information.
Yet one day, you are sitting in your cubicle, and you discover a security hole that once publicized, if attacked by a hacker or a disgruntled ...
Get Writing Information Security Policies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.