Author: seth
-
RiskKey 2010 Winter Release
Happy Holidays All,(more…) -
Auditing with Personality
Auditing is often regarded as a drab, boring, analytical, spreadsheets kind of world. However, I have found that it is not nearly as black and white as some think. It’s just as much art as science, and the personalities involved provide quite a color spectrum. Simply put, who we are affects what we do, or as Ron Washington might say, “how we do.”
(more…) -
Modern Passwords Now Less Secure

By leveraging an older technology that has been revitalized, researcher Jeremi Gosney has managed to significantly reduce the time it takes to crack hashed passwords. By using Virtual OpenCL, Gosney was able to leverage 4U servers equipped with 25 AMD Radeon GPUs as a single brute-forcing monster. The system was able to churn through 348 billion (that’s billion with a B) hashes per second. With those kind of numbers virtually any password is vulnerable in an offline scenario. A 14 character NTLM hashed password can be cracked in 5.5 hours. LM hashed passwords can be brute-forced in minutes.This scenario usually isn’t going to be helpful in an active attack scenario. The hours long cracking required make it more likely in an offline scenario (where the SAM database has been captured), but still quite feasible.(more…) -
A Complete Guide to the Information Security Lifecycle
When it comes to the safety of your data and technology systems, it’s vital that your organization recognizes the reality of the “information security lifecycle.” By its very name, the info security lifecycle indicates that true information security is a process, not a “one and done” solitary project. Information security has no end-point, and your operational framework should always strive to acknowledge that fact.
At Garland Heart, we use a lifecycle model that serves as a useful baseline to help build a solid foundation for any security program across any type of organization and industry focus. Using the lifecycle model can provide you with a road map to ensure that your information security is continually being improved.
(more…) -
Top 5 Regulatory Compliance Updates in 2018
Regulatory compliance and information security has exploded as a topic of conversation in the last 15 years while technology has emerged at a break-neck speed. Annual updates, amendments, requirements and expectations are planned for months in advance, and the savvy business-owner must stay on top of the new information coming in to avoid an embarrassing scramble before the examiner visits.
(more…) -
Top Five Takeaways of Information Security in 2017
The nature of information security is that it is ever evolving. As we become more technologically advanced, new challenges present themselves. The key is to never become complacent, and always keep an eye out for advancements that can protect you, your team and your clients.
(more…) -
Proactive Compliance
{{ script_embed(‘wistia’, ‘783ndxl2yg’, ‘, ‘, ‘inline,responsive’) }}We understand the budget restraints and “rabbit hole” you can get yourself into regarding compliance and security. How much do I do before the cost outweighs the benefit?
(more…)
