Syrinx Technologies

Syrinx Technologies Library




ARTICLES

Syrinx Technologies
PDF - In Search of Low-Hanging Fruit: Improving Security and Privacy with Penetration Testing
PDF - Don't Be a Box Checker
PDF - Choosing a Penetration Test Partner
PDF - Reducing the Cost of Compliance
PDF - Why Simple Can Be Secure
PDF - Embracing A Security Audit
PDF - 10-8-2008 ISSA Meeting Presentation
PDF - 10-29-2008 Cisco VATS PCI Presentation (3MB)
PDF - Web/Database Server Security Best Practices
PDF - Infrastructure Auditing
PDF - Securing Remote Access to IT Resources

Other Authors
PDF - How to Get the Job Done, by Sandro Gauci, EnableSecurity
PDF - History of Hacking, by Dave Shackelford, CIS
PDF - Lateral SQL Injection in Oracle, by David Litchfield, NGSSoftware
PDF - Cracking SQL Passwords, by David Litchfield, NGSSoftware
PDF - VoIP Security Threats, by Peter Thermos, Palindrome Technologies
PDF - Data Leakage Study by Cisco Systems


UP TOP

PCI Information

PDF - PCI Compliance Cheat Sheet
IE - PCI Page


UP TOP

DOWNLOADS

Syrinx Technologies
PDF - Code of Ethics
PDF - Travel & Expense Policies
PDF - Founding Principles
PDF - Penetration Testing Methodology
PDF - Service Offerings
PDF - Defensive IT Security 101 Brochure
PDF - Defensive IT Security 101 Class Schedule
PDF - Laptop Audit
PDF - Virtual CSO
PDF - Innsbrook Today Magazine January 2008 Ad
PDF - Innsbrook Today Magazine May 2008 Ad
PDF - Innsbrook Today Magazine September 2008 Ad
PDF - 2009 RMA Ad
IE - Privacy Policy


UP TOP

ID Theft Red Flags Rule

PDF - Information


UP TOP

Development/Programming

IE - OWASP 3.0 Web App Testing Guide
IE - Mitre Top 25 Most Dangerous Programming Errors


UP TOP

Virtualization

PDF - Virtualization Security, by Daniel Ingevaldson (10MB ZIP)
IE - Virtualization FAQ
IE - "Virtualisation users should expect more attacks", by Tom Jowitt

UP TOP