Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Iran Targeted by New Computer Worm in Cyber Attack

April 25, 2011 Added by:Headlines

"Certain characteristics about the 'Stars' virus have been identified, including that it is compatible with the (targeted) system. In the initial stage, the damage is low and it is likely to be mistaken for governmental executable files..."

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Defending Web Apps Against Overwhelming Odds

April 24, 2011 Added by:Rafal Los

We can all agree that there are enough *exploitable security defects* in software that virtually every organization on the planet can (and will) be broken into given enough time - so where does that leave us? More importantly, what does that have to do with cloud computing?

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Audit Analytics in an FCPA Compliance Program

April 24, 2011 Added by:Thomas Fox

The laws of many countries vary in terms of the capture and correlation of ERP data and if such information can be transmitted outside a country. Such issues may be overcome with multiple servers or other hosting solutions, it also increases the difficulty of capturing such data...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Cookies and Your Privacy: Past, Present and Future

April 24, 2011 Added by:Theresa Payton

If restrictions to cookies become common place on the internet, the Internet Advertising Bureau will be forced to make major changes to the way they obtain information about internet users. This could alter the entire structure of internet advertising as we know it today...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Chinese Hackers Spear-Phishing for US Military Secrets

April 23, 2011 Added by:Dan Dieterle

What could the Chinese hope to gain? Military secrets. Along with terabytes of data that have been stolen, the Chinese also obtained login credentials and blue prints to some of America’s hi-tech military equipment...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

The History Behind EIGRP

April 22, 2011 Added by:Global Knowledge

IGRP scales better than RIP, as internetworks continued to grow in size a D-V protocol such as IGRP required excessive amounts of router CPU power and link bandwidth to support periodic advertisements. To overcome these limitations, EIGRP was developed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Five Ways to Improve Enterprise Data Security Programs

April 22, 2011 Added by:Headlines

What constitutes an acceptable level of information security risk in an environment when intellectual property, personal customer information and the brand are at stake? It’s a tough decision, but one that should be made to form the foundation of an information security program...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Overtake Insiders as Leading Cause of Data Loss

April 22, 2011 Added by:Headlines

The responsibility for protecting personal identifying information is on those who request and store it. All entities that collect personal information need to understand the concept that only they can safeguard our information, and that this safeguarding must be an urgent priority...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Software Security Incidents Cost an Average $300,000

April 22, 2011 Added by:Robert Siciliano

Enterprises must move from technological security silos to enterprise security intelligence. This can be achieved through the interaction of different technologies as well as contextual analyses of integrated security and business information...

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

PCI Security Compliance: Q and A with Anton Chuvakin

April 22, 2011 Added by:Anton Chuvakin

PCI DSS and other PCI standards were intended as a baseline set of security practices, not as a comprehensive, upper limit on security. For various reasons, it is hard for many organizations to understand that. What results is a false sense of security and a mistaken sense of betrayal...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Skype Fixes Critical Android Application Vulnerability

April 22, 2011 Added by:Headlines

"After a period of developing and testing we have released a new version of the Skype for Android application onto the Android Market, containing a fix to the vulnerability reported to us. Please update to this version as soon as possible in order to help protect your information..."

Comments  (0)

67a9d83011f3fbb2cf8503aff453cc24

Information Security Risk Management Programs Part 3

April 21, 2011 Added by:kapil assudani

Business use cases must be consumed by the IT group to build functional/non-functional requirements. Security mis-use cases in their remediated language turn into functional/non-functional requirements. If security is engaged - we translate them into detailed technical requirements...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

SEC Fines Executives for Privacy and Security Violations

April 21, 2011 Added by:David Navetta

Companies have to assess the adequacy of their privacy and data security practices, including understanding the privacy and data security legal requirements that could impact the company’s business, ensuring that the company’s practices are consistent with those requirements...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Plans Comprehensive Cyber Security Strategy

April 21, 2011 Added by:Headlines

Despite continued debate by security experts as to whether the concept of "cyber warfare" appropriately describes military actions conducted in an electronic medium, the Pentagon is moving forward with a declaration that cyberspace will be considered an operational domain...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nuclear Research Facility Lacks Adequate Cyber Security

April 21, 2011 Added by:Headlines

"Without improvements, the weaknesses identified may limit program and site-level officials' ability to make informed risk-based decisions that support the protection of classified information and the systems on which it resides," a federal audit concluded...

Comments  (0)

7e364bbac217114a59e547b354e7f7ad

Let’s Go with the Web Application Scan... It's Cheaper

April 21, 2011 Added by:Gary McCully

Many times, when choosing a Web Application Assessment, a company will choose the cheapest Assessment available without understanding the Pros and Cons of each Web Application Security Assessment. It is important to realize the fact that the cheapest option is not always the best option...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »