Latest Blog Posts


Will the Demise of XP Shut Down Your Business…or Heart?

March 25, 2014 Added by:Rebecca Herold

According to NetMarketShare at the end of February, 2014, 30% of all folks using Windows desktop computers were still running Windows XP.

Comments  (0)


Missing the (opportunity of) Target

March 25, 2014 Added by:Jack Daniel

What we have is an opportunity to make customers and some merchants happier by standardizing technology across the globe - and we could slide a little increase in security into the process at the same time.

Comments  (0)


Microsoft Says: Come Back with a Warrant, Unless You’re Microsoft

March 24, 2014 Added by:Electronic Frontier Foundation

The search in the Kibkalo case may have revealed criminal activity, but it was also conducted in Microsoft’s self-interest, which is an exceedingly dangerous precedent.

Comments  (0)


To Win Sales, Go Where Competitors Fear to Tread: Security

March 24, 2014 Added by:Sanket Naik

Security is non-revenue producing and not usually related to product function, so unless vendors are selling to an industry that must meet certain regulatory requirements, they have a tendency to avoid the security discussion and hope the customer won’t bring it up.

Comments  (0)


Why is Guy Fawkes an Anarchist Hero?

March 23, 2014 Added by:Wayde York

Why do Anonymous hackers and other anarchists use the mask of Guy Fawkes as their symbol? George Orwell may be a better anarchist freedom for all mask than Guy Fawkes.

Comments  (2)


BYOD For Government?

March 23, 2014 Added by:Cam Roberson

BYOD is fast becoming the norm for many enterprises, despite the security risks. Government agencies have been slower to adopt, but will need to start implementing policies that address BYOD.

Comments  (1)


Missing Malaysia 370 Lesson Learned: It's Time to Secure 'The Black Box' in 'The Cloud'

March 22, 2014 Added by:InfosecIsland News

Oliver McGee, former U.S. deputy assistant secretary of transportation for technology policy in the Clinton Administration, and founder of Partnership Possibilities for America, gives his take on mega-technology trends of international aviation safety and security in the next decade and beyond.

Comments  (0)


On Internally-sourced Threat Intelligence

March 20, 2014 Added by:Anton Chuvakin

At the very top of the very top of the pyramid...sit organizations that produce their own threat intelligence (TI), sourced from local artifacts and their own intelligence gathering activities.

Comments  (0)


Here's Full Disclosure - Now No Disclosure

March 20, 2014 Added by:Javvad Malik

Full disclosure has announced it’s shutting down.

Comments  (1)


Adapting Vulnerability Management to Address Advanced Persistent Threats

March 19, 2014 Added by:Tripwire Inc

In addition to being one of the top SANS Critical Security Controls and part of numerous other compliance frameworks, vulnerability management is generally accepted as basic security hygiene today for corporate networks.

Comments  (0)


Recent Development of ICS Exploits Continues Upward Trend of Security Research

March 19, 2014 Added by:Joel Langill

One very important part of a well-rounded ICS Security Management System is situational awareness of the actual risks facing industrial systems in terms of both vulnerabilities disclosed and the ease in converting these proof-of-concept (PoC) disclosures into workable exploit modules.

Comments  (0)


System Hardening: Defend Like An Attacker

March 18, 2014 Added by:Tripwire Inc

Defenders also need to think like attackers. Easier said than done.

Comments  (0)


The Windows XP Rundown is Really About Security

March 18, 2014 Added by:Praveen Manohar

Now is an appropriate time to discuss the implications of the end of XP support and explore what the rundown is really all about: security.

Comments  (0)


Who Protects Your Corporate Digital Footprint?

March 18, 2014 Added by:Allan Pratt, MBA

What happens when someone infringes on your company name, brand name, or tagline? Does your business have a procedure in place? Which department is responsible for taking action?

Comments  (0)


Bipartisan Policy Committee Report on Cyber Security of the Electric Grid – What’s Missing

March 17, 2014 Added by:Joe Weiss

I believe the only means for cyber threats to cause long term and wide-spread grid failure is through compromising the control systems of facilities leading to physical damage of long-lead time critical equipment such as transformers and turbines.

Comments  (0)


Delving into Threat Actor Profiles

March 17, 2014 Added by:Anton Chuvakin

Threat actor profiles can be used by a fledgling threat intelligence operation to organize their knowledge about who is “out to get them” and who they observe on their network. Such knowledge organization helps prioritize incident response and alert triage activities.

Comments  (0)

« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »