Latest Blog Posts


Sneaky LinkedIn is Using Member Profiles for Advertising

July 25, 2011 Added by:Headlines

"When LinkedIn members recommend people and services, follow companies, or take other actions, their name/photo may show up in related ads shown to you. Conversely, when you take these actions on LinkedIn, your name/photo may show up in related ads shown to LinkedIn members..."

Comments  (0)


On Branding Your Enterprise Compliance Project

July 25, 2011 Added by:Thomas Fox

Even with the economy on the upswing, corporations being extremely conservative on funding, especially for departments which are viewed as more overhead than revenue generating. Project teams who embrace a brand mentality put themselves in a stronger position to achieve their goals...

Comments  (0)


Oslo Bombing Facebook Scam Infects One Per Second

July 25, 2011 Added by:Headlines

"Be cautious when clicking on breaking news trends and stories within search results related to the Oslo tragedy. Right now it seems to be infecting one user every second. The scam is a form of ‘clickjacking’ that replicates itself on users’ walls after they click on fake posts..."

Comments  (0)


PCI Compliance Scam? You Tell Me...

July 25, 2011 Added by:PCI Guru

These sorts of actions by organizations just add fuel to the fire for critics to use as another argument as to why the PCI compliance programs are pointless and organizations should not bother with complying with any of the PCI standards...

Comments  (0)


Indicted iPad Hacker Predicts Internet Revolution

July 25, 2011 Added by:Headlines

“I look at it like the precursor to revolution. I really think this is throwing tea in the bay. I’m tired of seeing a financial industry suck at the trough of 401K’s, looting my nation and leaving us a third-world country..."

Comments  (0)


ASA and IPS Parallel Features – Part III

July 25, 2011 Added by:Dawn Hopper

One scenario in which asymmetric routing of packets is frequently seen is with topologies designed for load balancing. The unintended consequence of this behavior would be connectivity problems due to dropped packets not matching the device state table...

Comments  (0)


Web Application Attacks Can Peak at 25,000 an Hour

July 25, 2011 Added by:Headlines

The study of 10 million web application attacks shows automated attacks peak at 25,000 an hour. "The level of automation in cyber attacks continues to shock us. The sheer volume of attacks that can be carried out in such a short period of time is almost unimaginable to most businesses..."

Comments  (0)


Practical Packet Analysis Using Wireshark

July 24, 2011 Added by:J. Oquendo

I am not trying to write a scathing review, I am basing my review on experience.. I have used Wireshark since it was created in 1998 when it was called Ethereal. I have used both Wireshark and Omnipeek every single day for over a decade...

Comments  (1)


What Does Verizon’s 2011 DBIR Mean to Your Enterprise?

July 24, 2011 Added by:Robb Reck

It’s not easy to go through every system in our environment and ensure that remote administration is turned off where it can be and closely monitored where it cannot, but it is simple; if you don’t know where the doors into your data are, you can’t defend them...

Comments  (3)


Business Relevant Infosec - The Top and Bottom Lines

July 24, 2011 Added by:Rafal Los

Security isn't somehow disconnected from the business... it's part of the business. When we fail to see that, to acknowledge that, then we lose - and by we I mean the entire community, the organization and you too...

Comments  (0)


Privacy and Security Policies: A HIPAA-HITECH Checklist

July 24, 2011 Added by:Jack Anderson

"An important component of preparing for a potential HIPAA compliance audit is to complete a walk-through to make sure privacy and security policies and procedures are practical and effective..."

Comments  (0)


Fifteen Important Social Media Security Tips

July 23, 2011 Added by:Robert Siciliano

Don’t click on short links that don’t clearly show the link location. Criminals often post phony links that claim to show who has been viewing your profile. Test unknown links at by pasting the link into the “View a Site Report” form on the right-hand side of the page...

Comments  (8)


JPMorgan Chase Banker Pleads Guilty to ID Theft

July 23, 2011 Added by:Headlines

Manhattan District Attorney Cyrus R. Vance, Jr., today announced the guilty plea of HAO “HOWIE” WANG, 28, for stealing more than $1.1 million from JPMorgan Chase and stealing the identities of four victims. WANG pled guilty to Grand Larceny, Identity Theft, Falsifying Records, and Forgery...

Comments  (2)


Practical Security Management for Startups

July 22, 2011 Added by:Danny Lieberman

Startup management needs to know how much their information security measures will cost and how it helps them run the business. Business Threat Modeling (TM) is a practical way for a manager to assess the operational risk for the startup in dollars and cents...

Comments  (0)


Capitalizing on Privacy Practices

July 22, 2011 Added by:David Navetta

Businesses that put privacy into the design of their products and services are less likely to face consumer and regulatory backlash. Businesses may benefit in another way from protective privacy practices - this recent study indicates that it may be leveraged as a selling point...

Comments  (0)


Federal CIO Vivek Kundra Warns of IT Vendor Cartel

July 22, 2011 Added by:Headlines

In what could best be described as a proclamation reminiscent of Eisenhower's admonition of the powerful "military industrial complex", outgoing Federal CIO Vivek Kundra issued statements warning of security risks compounded by "an IT cartel" of vendors perpetuating big contract boondoggles...

Comments  (1)

« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »