Skip to main content

Home/ NBISE Institute/ Group items tagged Testing

Rss Feed Group items tagged

dhtobey Tobey

Home - Performance Testing Council - 0 views

  • The Performance Testing Council is your gateway to freely exchange experiences, knowledge, and yes, passion with others in the practice of performance testing. Membership will help you refine your evaluation program as you learn from experts, share best practices, help define research, expand your marketplace and help establish common delivery standards.
  •  
    Community of interest group for performance testing
Michael Assante

App security testing - 0 views

  •  
    About application security testing
dhtobey Tobey

Security Training, CEH, Ethical Hacking, Penetration Testing, Certified Ethical Hacker,... - 0 views

  •  
    Potential partner in developing and distributing assessments targeting the entry level of operational security testing.
Steve King

Special report: Government in cyber fight but can't keep up | Reuters - 0 views

  •  
    The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new technologies, according to officials familiar with the plans, as a recent wave of cyber attacks boosts concerns about U.S. vulnerability to digital warfare.

    The twin efforts show how President Barack Obama's administration is racing on multiple fronts to plug the holes in U.S. cyber defenses.

    Notwithstanding the military's efforts, however, the overall gap appears to be widening, as adversaries and criminals move faster than government and corporations, and technologies such as mobile applications for smart phones proliferate more rapidly than policymakers can respond, officials and analysts said.
dhtobey Tobey

AA-ISP selects BrainX On-line System for CISP® Accreditation Program | Press ... - 0 views

  • We felt a need to both identify and then test the set of competencies and skills required at the individual rep level”, stated Reeves. AA-ISP Founder and CEO, Bob Perkins goes on to note, “For years corporations have made significant investments in hiring, training, and on-boarding inside sales professionals. Yet there remains a need to, quantify, measure, and then test these skills to assure an individual was competent. We selected BrainX [www.BrainX.com] because their unique on-line learning system. If a salesperson doesn’t meet the required knowledge and skill level the BrainX on-line learning system builds a personal set of Sales Courses and simulations to help the salesperson master the required knowledge and skills so they can pass the accreditation requirements.
  • Bruce Lewolt the CEO of BrainX says he is proud that an organization that understands the world of sales training as well as the AA-ISP would recognize the value of personalized sales training that is mastery based
  • Lewolt agrees and added that it is only with this level of mastery that the conscious centers of the brain are freed up to really listen to what the customer is saying well enough to be able to read between the lines and figure out what it really driving the customer
  • ...2 more annotations...
  • The BrainX On-line Learning system is an intelligent system that uses a series of knowledge, skill and belief assessments and builds a cognitive learning profile on each learner. The BrainX Digital Tutor uses the first set of assessments to figure out just what each sales person should focus on and combines this with the personal cognitive profile to mold the delivery of the lesson content and simulations in a way that helps each individual master the required set of skills and competencies in the shortest amount of time so they can obtain their CISP®.
  • About BrainX BrainX is the next generation of online learning and Talent Management! BrainX is the first system to combine patented intelligent learning technology with mastery-based, learning strategies. BrainX participated in the landmark research on the neurobiology of effective sales training and used this research to design the BrainX system. The result is a system that accepts any type of content (e.g. product training, sales training, negotiation training) and stores the content in a way that allows the BrainX Digital Tutor to understand the content. The BrainX system figures out just what each person already knows along with what they need to learn. The system uses this information along with the understanding of the lesson content to build personalized lessons that teach each person just what they need: to know; to be able to do; and to believe about why something needs to be done in the correct way. With BrainX the days of one size fits all sales training courses are gone forever. The BrainX system also builds a cognitive learning profile on each learner and uses this information to customize the way lessons are taught and to determine how much post lesson reinforcement each sales person needs. This approach is so effective that when compared to traditional online learning, BrainX users achieve mastery in 50% less time. www.BrainX.com
  •  
    Brain-X appears to be a system worth investigating as we develop tools to support assessment-based development.
dhtobey Tobey

European e-Competence Framework - Home - 0 views

  • The European e-Competence Framework (e-CF) is a reference framework of 36 ICT competences that can be used and understood by ICT user and supply companies, the public sector, educational and social partners across Europe.
  • European e-Competence Framework 2.0 for download
  • European e-Competence Framework 2.0 - downloadUser guidelines for the application of the European e-Competence Framework 2.0 - downloadBuilding the e-CF - a combination of sound methodology and expert contribution - downloadEuropean e-Competence Framework 2.0 - Executive overview - download
  • ...2 more annotations...
  • European e-Competence Framework 2.0 - downloadUser guidelines for the application of the European e-Competence Framework 2.0 - downloadBuilding the e-CF - a combination of sound methodology and expert contribution - downloadEuropean e-Competence Framework 2.0 - Executive overview - download
    • dhtobey Tobey
       
      This is an example of how we might publish our Competency Model for Operational Security Testing.
dhtobey Tobey

Outgunned: How Security Tech Is Failing Us -- InformationWeek - 0 views

  • "Years ago when we started writing checks, we might have been tackling five to 10 a day," says Paul Wood, a senior analyst with Symantec Hosted Services. "It's now well over 10,000 a day and growing." According to McAfee's 2010 Q2 Threat Report, the company identified 10 million pieces of malware in the first half of this year and is tracking close to 45 million in its malware database.
  • Vulnerability assessment products are also behind the curve, as Greg Ose and Patrick Toomey, both Neohapsis application security consultants, found when they recently set out to measure the relative effectiveness of various vulnerability scanners. "It's a question frequently raised by our customers," Toomey says. "They know the tools aren't going to catch all of the problems, but can they count on them to catch, say, 80% of the bad ones?" What Ose and Toomey discovered was far worse than even they had anticipated. Out of the 1,404 vulnerabilities accounted for by the Common Vulnerabilities and Exposures project during the sample period, there were only 371 signatures. In the best cases, the tools were in the 20% to 30% effectiveness range.
  • Toomey's observations are in line with those of security researcher Larry Suto, who earlier this year reported that Web application vulnerability scanners missed almost half (49%) of the vulnerabilities present during his tests.
  • ...5 more annotations...
  • But there's also a new twist to consider: With an increased number of attackers targeting and hijacking the credentials of IT personnel, the outsider can become the insider, at least from the perspective of our technology controls. Forward-thinking companies will move now to address this scenario. Think about how you'll detect large, anomalous query spikes against key tables in sensitive databases. Ensure you can spot large-scale document downloads from file shares and internal document management systems. If a hijacked credential is used to log into a large number of machines during a short time frame, you should have the ability to spot that activity.
    • dhtobey Tobey
       
      Investing in workforce development and professionalizatino of the infosec workforce may do more.. combat ingenuity with ingenuity, not automation.
  • investing even a small percentage of your security budget in only a few specialized systems to help here will go further than throwing good money at yesterday's outdated controls.
  • Stop rewarding ineffectiveness and start rewarding innovation. Maybe right now you're struggling with a scary realization: "The millions I'm spending on firewalls and antivirus technology is relatively worthless if my adversary is skilled."
  • Greg Shipley is an InformationWeek contributor and a former CTO
1 - 7 of 7
Showing 20 items per page