Professionals in the information security industry to build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing or using information security solutions - this group is for you.
Location: Hawaii
Members: 4
Latest Activity: Jan 28, 2011
MySpace Tweet Facebook Facebook
What is the best approach for provisioning user access in a medium sized company? A centralized desk which grants all access or having access granted by asset owners; AD = Sysadmins, Database = DBA's…Continue
Tags: security, information
Started by GR Oct 22, 2009.
Microsoft is recommending setting the kill bit for an ActiveX control object, MPEG2TuneRequest, to avoid an in the wild zero day exploit that allows for remote code execution when a web site…Continue
Started by GR Oct 18, 2009.
Windows Server 2008 R2 was released in August, and it introduced new functional levels for Active Directory. This article takes a look back at the different functional levels of the past and what is…Continue
Started by GR Oct 18, 2009.
© 2025 Created by Daniel Leuck.
Powered by
You need to be a member of Information Security Community / ISO27000 to add comments!