Tag Archives: Independent Security Evaluators

How to Create Strong Passwords to Ward Off Online Hackers (WUSA)

Hackers are more likely to succeed if your passwords are weak. So here's how to take control of your digital security. The best passwords are unique and very long, according to Te... More

M&E Journal: Secure Design Principles

By Ted Harrington, Executive Partner, Independent Security Evaluators (ISE) - First, it is important to define the primary secure design principles. Different academic, research o... More

XML vs. JSON: A Security Perspective (Independent Security Evaluators)

XML and JSON are both universal formats for arbitrary data sharing between computer architectures and programs, but there are a number of differences between them. These difference... More

Independent Security Evaluators: Holding Applications to a Higher Standard

Baltimore-based Independent Security Evaluators (ISE) has a unique perspective among security firms: the aggressive defense strategies needed to thwart attacks today must be center... More

NAB 2017: ISE Talks Threatscaping; Box Looks at Cloud Security

LAS VEGAS — Ted Harrington, executive partner for Independent Security Evaluators, used his time at the Content Delivery and Security Association (CDSA) Cybersecurity and Content... More

Featured Jobs: Microsoft Azure; Technicolor; ISE

Software Engineer, Azure Security Center — Israel, Herzelia — Microsoft Azure Security Assessment Engineer — Burbank, CA — Technicolor Associate Security  Consultant... More

Featured Jobs: NSS Labs; ISE; Kroll

Senior Test Engineer, Cloud and Virtualization — Austin, TX — NSS Labs Security Analyst— San Diego — ISE Cybersecurity Consultant — Telecommute — Kroll Click her... More

Featured Jobs: NSS Labs; Independent Security Evaluators; Signiant

Test Engineer, Breach Prevention — Austin, Texas — NSS Labs Senior Security Analyst — San Diego — ISE Technical Support Specialist — Ottawa, Ontario — Signiant Click h... More

ISE’s Harrington: Security Adversaries Using ‘Stepping Stone’ Attacks More Often (ITSP Magazine)

Today the modern adversary uses what's called a stepping stone attack, where they will attack a lesser sophisticated part of the chain, compromise that part to then pivot the attac... More

ISE’s Harrington: Beware IoT ‘Stepping Stone’ Attacks (Tech Central)

A recent webinar hosted by The Security Ledger entitled: “Who Let the IoT in?: Finding and securing wireless devices in your environment,” was designed to offer some advance ... More