Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Diaries by Keyword - SANS Internet Storm Center Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

SOFTWARE RESTRICTION POLICY

2010-06-07Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away

SOFTWARE

2017-11-25/a>Guy BruneauBenefits associated with the use of Open Source Software
2017-10-12/a>Xavier MertensVersion control tools aren't only for Developers
2016-12-27/a>Guy BruneauUsing daemonlogger as a Software Tap
2016-11-25/a>Xavier MertensFree Software Quick Security Checklist
2015-06-29/a>Rob VandenBrinkThe Powershell Diaries 2 - Software Inventory
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2011-01-19/a>Johannes UllrichMicrosoft's Secure Developer Tools
2011-01-05/a>Johannes UllrichSurvey: Software Security Awareness Training
2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2008-10-29/a>Deborah HaleDay 29 - Should I Switch Software Vendors?

RESTRICTION

2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away

POLICY

2019-01-14/a>Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2017-05-17/a>Richard PorterWait What? We don?t have to change passwords every 90 days?
2016-07-23/a>Russell EubanksIt Is Our Policy
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-18/a>Rob VandenBrinkControlling JavaScript Malware Before it Runs
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-08-02/a>Russell EubanksYour Security Policy Is So Lame
2013-12-23/a>Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy
2012-02-05/a>Tony CarothersCybersecurity Legislation Components
2011-07-13/a>Guy BruneauAre Mobile Devices taking over your Corporate Network?
2011-06-22/a>Guy BruneauHow Good is your Employee Termination Policy?
2011-01-25/a>Chris MohanReviewing our preconceptions
2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2010-01-23/a>Lorna HutchesonThe necessary evils: Policies, Processes and Procedures
2009-11-13/a>Adrien de BeaupreFlash Origin Policy Attack
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies