Definitions

Sorry, no definitions found. You may find more data at infosec.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word InfoSec.

Examples

  • A program started in March called InfoSec Mentors has already paired more than 100 mentors and mentees who share their expertise on technology as well as broader issues such as how to define and achieve career goals, spread their ideas about the industry and overhaul their resumes.

    CIO.in 2010

  • CC: websecurity@webappsec.org Personal experience has shown for me that the best way to = start getting any kind of InfoSec initiative going in a corporate environment = is to analyze the threats that you could face by building a Threat Model.

    The Web Security Mailing List (WASC) 2010

  • From: cschmidt@servicemagic.com To: jim@manico. net; ruel555@hotmail. com CC: websecurity@webappsec. org Personal experience has shown for me that the best way to start getting any kind of InfoSec initiative going in a corporate environment is to analyze the threats that you could face by building a Threat Model.

    The Web Security Mailing List (WASC) 2010

  • From: cschmidt@servicemagic.com To: jim@manico. net; ruel555@hotmail. com CC: websecurity@webappsec. org Personal experience has shown for me that the best way to start getting any kind of InfoSec initiative going in a corporate environment is to analyze the threats that you could face by building a Threat Model.

    The Web Security Mailing List (WASC) 2010

  • CC: websecurity@webappsec.org Personal experience has shown for me that the best way to = start getting any kind of InfoSec initiative going in a corporate environment = is to analyze the threats that you could face by building a Threat Model.

    The Web Security Mailing List (WASC) 2010

  • CC: websecurity@webappsec.org Personal experience has shown for me that the best way to = start getting any kind of InfoSec initiative going in a corporate environment = is to analyze the threats that you could face by building a Threat Model.

    The Web Security Mailing List (WASC) 2010

  • From: cschmidt@servicemagic.com To: jim@manico. net; ruel555@hotmail. com CC: websecurity@webappsec. org Personal experience has shown for me that the best way to start getting any kind of InfoSec initiative going in a corporate environment is to analyze the threats that you could face by building a Threat Model.

    The Web Security Mailing List (WASC) 2010

  • I am not a Ruby developer, but rather an InfoSec practitioner.

    Building the Community We Need « Dyepot, Teapot 2009

  • The authors want the practice of InfoSec to be based [...]

    2008 September « PurpleSlog – Awesomeness & Modesty Meets Sexy 2008

  • Imagine the InfoSec options, be it the improvements to surveillance, counter espionage tactics versus industrial espionage, and even something as simple, as well as insidious, as investigations of employees.

    Life on Mars? Michael Alan Nelson 2009

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.