Latest Blog Posts

65be44ae7088566069cc3bef454174a7

Will the Demise of XP Shut Down Your Business…or Heart?

March 25, 2014 Added by:Rebecca Herold

According to NetMarketShare at the end of February, 2014, 30% of all folks using Windows desktop computers were still running Windows XP.

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Missing the (opportunity of) Target

March 25, 2014 Added by:Jack Daniel

What we have is an opportunity to make customers and some merchants happier by standardizing technology across the globe - and we could slide a little increase in security into the process at the same time.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Microsoft Says: Come Back with a Warrant, Unless You’re Microsoft

March 24, 2014 Added by:Electronic Frontier Foundation

The search in the Kibkalo case may have revealed criminal activity, but it was also conducted in Microsoft’s self-interest, which is an exceedingly dangerous precedent.

Comments  (0)

64741e7fa2550983fc6cc9c12ea0967e

To Win Sales, Go Where Competitors Fear to Tread: Security

March 24, 2014 Added by:Sanket Naik

Security is non-revenue producing and not usually related to product function, so unless vendors are selling to an industry that must meet certain regulatory requirements, they have a tendency to avoid the security discussion and hope the customer won’t bring it up.

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

Why is Guy Fawkes an Anarchist Hero?

March 23, 2014 Added by:Wayde York

Why do Anonymous hackers and other anarchists use the mask of Guy Fawkes as their symbol? George Orwell may be a better anarchist freedom for all mask than Guy Fawkes.

Comments  (2)

52a995fead03e1d828980d4b3efd2719

BYOD For Government?

March 23, 2014 Added by:Cam Roberson

BYOD is fast becoming the norm for many enterprises, despite the security risks. Government agencies have been slower to adopt, but will need to start implementing policies that address BYOD.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Missing Malaysia 370 Lesson Learned: It's Time to Secure 'The Black Box' in 'The Cloud'

March 22, 2014 Added by:InfosecIsland News

Oliver McGee, former U.S. deputy assistant secretary of transportation for technology policy in the Clinton Administration, and founder of Partnership Possibilities for America, gives his take on mega-technology trends of international aviation safety and security in the next decade and beyond.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On Internally-sourced Threat Intelligence

March 20, 2014 Added by:Anton Chuvakin

At the very top of the very top of the pyramid...sit organizations that produce their own threat intelligence (TI), sourced from local artifacts and their own intelligence gathering activities.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Here's Full Disclosure - Now No Disclosure

March 20, 2014 Added by:Javvad Malik

Full disclosure has announced it’s shutting down.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Adapting Vulnerability Management to Address Advanced Persistent Threats

March 19, 2014 Added by:Tripwire Inc

In addition to being one of the top SANS Critical Security Controls and part of numerous other compliance frameworks, vulnerability management is generally accepted as basic security hygiene today for corporate networks.

Comments  (0)

7b072d611db66025d89ff3137dcddfb3

Recent Development of ICS Exploits Continues Upward Trend of Security Research

March 19, 2014 Added by:Joel Langill

One very important part of a well-rounded ICS Security Management System is situational awareness of the actual risks facing industrial systems in terms of both vulnerabilities disclosed and the ease in converting these proof-of-concept (PoC) disclosures into workable exploit modules.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

System Hardening: Defend Like An Attacker

March 18, 2014 Added by:Tripwire Inc

Defenders also need to think like attackers. Easier said than done.

Comments  (0)

37c1b0270687e8148e56508e805f8b8e

The Windows XP Rundown is Really About Security

March 18, 2014 Added by:Praveen Manohar

Now is an appropriate time to discuss the implications of the end of XP support and explore what the rundown is really all about: security.

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Who Protects Your Corporate Digital Footprint?

March 18, 2014 Added by:Allan Pratt, MBA

What happens when someone infringes on your company name, brand name, or tagline? Does your business have a procedure in place? Which department is responsible for taking action?

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Bipartisan Policy Committee Report on Cyber Security of the Electric Grid – What’s Missing

March 17, 2014 Added by:Joe Weiss

I believe the only means for cyber threats to cause long term and wide-spread grid failure is through compromising the control systems of facilities leading to physical damage of long-lead time critical equipment such as transformers and turbines.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Delving into Threat Actor Profiles

March 17, 2014 Added by:Anton Chuvakin

Threat actor profiles can be used by a fledgling threat intelligence operation to organize their knowledge about who is “out to get them” and who they observe on their network. Such knowledge organization helps prioritize incident response and alert triage activities.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »