Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Representative Introduces Consumer Privacy Protection Act

April 18, 2011 Added by:Headlines

The legislation will define limits and the fair use of information collected by online marketers and retailers, and set forth provisions for better notifying consumers of their right to opt out of data collection...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Defining the Insider Threat

April 17, 2011 Added by:Danny Lieberman

Mitigating the insider threat requires defining whether or not there IS a threat, and if so, finding the right security countermeasures to mitigate the risk. One wonders whether or not RSA eats their own dog food, and had deployed a data loss prevention system. Apparently not...

Comments  (8)

F520f65cba281c31e29c857faa651872

Mobile Devices Continue to Attract Cyber-Scamsters

April 17, 2011 Added by:Rahul Neel Mani

While it’s only beginning to percolate, a trend is clearly emerging— cyber criminals are looking for new opportunities outside of the PC environment. They are investing more resources toward developing exploits that specifically target users of mobile devices...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Forklifting Apps to the Cloud – Realistic or Not?

April 17, 2011 Added by:Ben Kepes

Aspects of this discussion are little more than cloud elites arguing finer points. There are some issues in the message used to justify the cloud to enterprises. We need to have a consistent story about what the cloud really means for an enterprise – something that is sadly lacking today...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

SSL Issues: From Man-in-the-Middle Attacks to Hackers

April 16, 2011 Added by:Dan Dieterle

There seems to be little verification before certificates are handed out. When you add in reports of hackers stealing or creating fake certificates and also hardware devices that perform SSL man-in-the-middle attacks, it sounds like SSL is really in need of an overhaul...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Introduction to Security Troubleshooting

April 15, 2011 Added by:Global Knowledge

In diagnosing connection and VPN problems, too often SSL or IPSec VPN client logs don’t provide enough information on why connections fail. Consequently, the receiver frequently provides the detail needed through selective debugging and logging...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Twitter Scam Hooks Thousands

April 15, 2011 Added by:Robert Siciliano

Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Software Security Assurance in a "One Man Show"

April 15, 2011 Added by:Rafal Los

Down-scaling an enterprise security challenge into a smaller fit is more of a challenge than you'd think, because it's just too easy to say 'outsource it all'... but how does that actually help an organization write more secure software? The answer is that it doesn't...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Accompanied by Signed Digital Certificate

April 15, 2011 Added by:Headlines

Researchers at have identified a Zeus Trojan variant accompanied by a signed digital certificate. The presence of a signed certificate from a legitimate CA makes the task of identifying and defending against the malware more difficult for antivirus software and file scanners...

Comments  (0)

67a9d83011f3fbb2cf8503aff453cc24

Information Security Risk Management Programs

April 15, 2011 Added by:kapil assudani

In many organizations the CISO reports to the CTO – which usually results in a conflict of interest. The goals of IT groups are performance and speedy implementation, which usually takes precedence over security considerations. As a result, security takes a back seat..

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HBGary's Open Letter to Customers and the Defense Marketplace

April 15, 2011 Added by:Headlines

While some details seem to jibe with the information contained in the tens-of-thousands of leaked emails, the letter for the most part just comes off as a generic attempt to rewrite the record and further distance HBGary Inc. from the activities of Aaron Barr and HBGary Federal..

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Detailed FISMA Logging Guidance

April 14, 2011 Added by:Anton Chuvakin

FISMA emphasizes the need for each Federal agency to develop, document, and implement an organization-wide program to secure the information systems that support its operations and assets. Here is what is likely needed for a successful FISMA-driven log management implementation...

Comments  (0)

39b6d5c1d3c6db11155b975f1b08059f

Data Loss Prevention: Less Flip this Week

April 14, 2011 Added by:Ron Lepofsky

Data leakage prevention technology tackles both data at rest residing within a network and specifically on disk storage and of course when data is in motion. Vendors of these technologies vary in what elements of the problem they wish to tackle. Some try to solve all possible problems...

Comments  (0)

0c4ca84ec3f3f2d57194f8e0cbd5ba85

Advantages of Hosted Software and Data Security

April 14, 2011 Added by:Lindsay Walker

Every workplace has "super-users," people who can hack into systems and extract sensitive information. Having information stored offsite makes it challenging for anyone inside your organization to get their eyes on information they aren't permitted to see...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Holds the Advantage in Cyber Espionage Game

April 14, 2011 Added by:Headlines

According to Brenner, thousands of U.S. companies were targeted in the Aurora attacks, a great deal more than the 34 companies publicly identified. Brenner says the scale of the operation demonstrates China's "heavy-handed use of state espionage against economic targets..."

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Panel to Examine Cyber Security Supply Chain Issues

April 14, 2011 Added by:Marjorie Morgan

Economics are driving both industry and government to adopt increasingly sophisticated technologies which raise serious new security issues. It is simply dangerous to suggest that the problems can be managed with a set of government determined technical standards...

Comments  (3)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »