Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Sneaky LinkedIn is Using Member Profiles for Advertising

July 25, 2011 Added by:Headlines

"When LinkedIn members recommend people and services, follow companies, or take other actions, their name/photo may show up in related ads shown to you. Conversely, when you take these actions on LinkedIn, your name/photo may show up in related ads shown to LinkedIn members..."

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

On Branding Your Enterprise Compliance Project

July 25, 2011 Added by:Thomas Fox

Even with the economy on the upswing, corporations being extremely conservative on funding, especially for departments which are viewed as more overhead than revenue generating. Project teams who embrace a brand mentality put themselves in a stronger position to achieve their goals...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Oslo Bombing Facebook Scam Infects One Per Second

July 25, 2011 Added by:Headlines

"Be cautious when clicking on breaking news trends and stories within search results related to the Oslo tragedy. Right now it seems to be infecting one user every second. The scam is a form of ‘clickjacking’ that replicates itself on users’ walls after they click on fake posts..."

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI Compliance Scam? You Tell Me...

July 25, 2011 Added by:PCI Guru

These sorts of actions by organizations just add fuel to the fire for critics to use as another argument as to why the PCI compliance programs are pointless and organizations should not bother with complying with any of the PCI standards...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Indicted iPad Hacker Predicts Internet Revolution

July 25, 2011 Added by:Headlines

“I look at it like the precursor to revolution. I really think this is throwing tea in the bay. I’m tired of seeing a financial industry suck at the trough of 401K’s, looting my nation and leaving us a third-world country..."

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part III

July 25, 2011 Added by:Dawn Hopper

One scenario in which asymmetric routing of packets is frequently seen is with topologies designed for load balancing. The unintended consequence of this behavior would be connectivity problems due to dropped packets not matching the device state table...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Web Application Attacks Can Peak at 25,000 an Hour

July 25, 2011 Added by:Headlines

The study of 10 million web application attacks shows automated attacks peak at 25,000 an hour. "The level of automation in cyber attacks continues to shock us. The sheer volume of attacks that can be carried out in such a short period of time is almost unimaginable to most businesses..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Practical Packet Analysis Using Wireshark

July 24, 2011 Added by:J. Oquendo

I am not trying to write a scathing review, I am basing my review on experience.. I have used Wireshark since it was created in 1998 when it was called Ethereal. I have used both Wireshark and Omnipeek every single day for over a decade...

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

What Does Verizon’s 2011 DBIR Mean to Your Enterprise?

July 24, 2011 Added by:Robb Reck

It’s not easy to go through every system in our environment and ensure that remote administration is turned off where it can be and closely monitored where it cannot, but it is simple; if you don’t know where the doors into your data are, you can’t defend them...

Comments  (3)

0a8cae998f9c51e3b3c0ccbaddf521aa

Business Relevant Infosec - The Top and Bottom Lines

July 24, 2011 Added by:Rafal Los

Security isn't somehow disconnected from the business... it's part of the business. When we fail to see that, to acknowledge that, then we lose - and by we I mean the entire community, the organization and you too...

Comments  (0)

10e258c8d23d441b915c1b2333b6996a

Privacy and Security Policies: A HIPAA-HITECH Checklist

July 24, 2011 Added by:Jack Anderson

"An important component of preparing for a potential HIPAA compliance audit is to complete a walk-through to make sure privacy and security policies and procedures are practical and effective..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Fifteen Important Social Media Security Tips

July 23, 2011 Added by:Robert Siciliano

Don’t click on short links that don’t clearly show the link location. Criminals often post phony links that claim to show who has been viewing your profile. Test unknown links at Siteadvisor.com by pasting the link into the “View a Site Report” form on the right-hand side of the page...

Comments  (8)

69dafe8b58066478aea48f3d0f384820

JPMorgan Chase Banker Pleads Guilty to ID Theft

July 23, 2011 Added by:Headlines

Manhattan District Attorney Cyrus R. Vance, Jr., today announced the guilty plea of HAO “HOWIE” WANG, 28, for stealing more than $1.1 million from JPMorgan Chase and stealing the identities of four victims. WANG pled guilty to Grand Larceny, Identity Theft, Falsifying Records, and Forgery...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Practical Security Management for Startups

July 22, 2011 Added by:Danny Lieberman

Startup management needs to know how much their information security measures will cost and how it helps them run the business. Business Threat Modeling (TM) is a practical way for a manager to assess the operational risk for the startup in dollars and cents...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Capitalizing on Privacy Practices

July 22, 2011 Added by:David Navetta

Businesses that put privacy into the design of their products and services are less likely to face consumer and regulatory backlash. Businesses may benefit in another way from protective privacy practices - this recent study indicates that it may be leveraged as a selling point...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Federal CIO Vivek Kundra Warns of IT Vendor Cartel

July 22, 2011 Added by:Headlines

In what could best be described as a proclamation reminiscent of Eisenhower's admonition of the powerful "military industrial complex", outgoing Federal CIO Vivek Kundra issued statements warning of security risks compounded by "an IT cartel" of vendors perpetuating big contract boondoggles...

Comments  (1)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »