Latest Blog Posts
March 25, 2014 Added by:Rebecca Herold
According to NetMarketShare at the end of February, 2014, 30% of all folks using Windows desktop computers were still running Windows XP.
March 24, 2014 Added by:Electronic Frontier Foundation
The search in the Kibkalo case may have revealed criminal activity, but it was also conducted in Microsoft’s self-interest, which is an exceedingly dangerous precedent.
March 24, 2014 Added by:Sanket Naik
Security is non-revenue producing and not usually related to product function, so unless vendors are selling to an industry that must meet certain regulatory requirements, they have a tendency to avoid the security discussion and hope the customer won’t bring it up.
March 22, 2014 Added by:InfosecIsland News
Oliver McGee, former U.S. deputy assistant secretary of transportation for technology policy in the Clinton Administration, and founder of Partnership Possibilities for America, gives his take on mega-technology trends of international aviation safety and security in the next decade and beyond.
March 19, 2014 Added by:Tripwire Inc
In addition to being one of the top SANS Critical Security Controls and part of numerous other compliance frameworks, vulnerability management is generally accepted as basic security hygiene today for corporate networks.
March 19, 2014 Added by:Joel Langill
One very important part of a well-rounded ICS Security Management System is situational awareness of the actual risks facing industrial systems in terms of both vulnerabilities disclosed and the ease in converting these proof-of-concept (PoC) disclosures into workable exploit modules.
March 17, 2014 Added by:Joe Weiss
I believe the only means for cyber threats to cause long term and wide-spread grid failure is through compromising the control systems of facilities leading to physical damage of long-lead time critical equipment such as transformers and turbines.
March 17, 2014 Added by:Anton Chuvakin
Threat actor profiles can be used by a fledgling threat intelligence operation to organize their knowledge about who is “out to get them” and who they observe on their network. Such knowledge organization helps prioritize incident response and alert triage activities.