Hackers are more likely to succeed if your passwords are weak. So here's how to take control of your digital security. The best passwords are unique and very long, according to Te... More
Tag Archives: Independent Security Evaluators
How to Create Strong Passwords to Ward Off Online Hackers (WUSA)
M&E Journal: Secure Design Principles
By Ted Harrington, Executive Partner, Independent Security Evaluators (ISE) - First, it is important to define the primary secure design principles. Different academic, research o... More
XML vs. JSON: A Security Perspective (Independent Security Evaluators)
XML and JSON are both universal formats for arbitrary data sharing between computer architectures and programs, but there are a number of differences between them. These difference... More
Independent Security Evaluators: Holding Applications to a Higher Standard
Baltimore-based Independent Security Evaluators (ISE) has a unique perspective among security firms: the aggressive defense strategies needed to thwart attacks today must be center... More
NAB 2017: ISE Talks Threatscaping; Box Looks at Cloud Security
LAS VEGAS — Ted Harrington, executive partner for Independent Security Evaluators, used his time at the Content Delivery and Security Association (CDSA) Cybersecurity and Content... More
Featured Jobs: Microsoft Azure; Technicolor; ISE
Software Engineer, Azure Security Center — Israel, Herzelia — Microsoft Azure Security Assessment Engineer — Burbank, CA — Technicolor Associate Security Consultant... More
Featured Jobs: NSS Labs; ISE; Kroll
Senior Test Engineer, Cloud and Virtualization — Austin, TX — NSS Labs Security Analyst— San Diego — ISE Cybersecurity Consultant — Telecommute — Kroll Click her... More
Featured Jobs: NSS Labs; Independent Security Evaluators; Signiant
Test Engineer, Breach Prevention — Austin, Texas — NSS Labs Senior Security Analyst — San Diego — ISE Technical Support Specialist — Ottawa, Ontario — Signiant Click h... More
ISE’s Harrington: Security Adversaries Using ‘Stepping Stone’ Attacks More Often (ITSP Magazine)
Today the modern adversary uses what's called a stepping stone attack, where they will attack a lesser sophisticated part of the chain, compromise that part to then pivot the attac... More
ISE’s Harrington: Beware IoT ‘Stepping Stone’ Attacks (Tech Central)
A recent webinar hosted by The Security Ledger entitled: “Who Let the IoT in?: Finding and securing wireless devices in your environment,” was designed to offer some advance ... More