Latest Blog Posts

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference to Take Place October 20-23 in Atlanta

July 07, 2014 Added by:Mike Lennon

The 2014 ICS Cybersecurity Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

The Flaw in Requirement 8.5.1

July 03, 2014 Added by:PCI Guru

All of you service providers out there that have remote access to your customers managed by some enterprise credential management solution, please implement a strong two-factor authentication solution on your customer credential management solution before you too become a newspaper headline.

Comments  (0)

Default-avatar

How Enterprises Can Leverage SMS to Minimize Security Risks and Aftermath

July 03, 2014 Added by:Steve French

As a virtually ubiquitous technology enabling automation and reliable two-way communications worldwide, SMS mobile messaging has proven crucial for those enterprises with effective data security, incident management and business continuity measures in place.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

It’s the end of June 2014 and ICS Cyber Security is Still an Enigma to Many

July 02, 2014 Added by:Joe Weiss

The past two weeks continue to demonstrate the lack of understanding about the unique issues of ICS cyber security – why isn’t it just IT.

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

In Defense of Reactive Security

July 01, 2014 Added by:Rafal Los

Every one of us reacts to our environment, it's how we survive. And yet - when you say "reactive" security today you get looks from people like that's a dirty word.

Comments  (0)

6d117b57d55f63febe392e40a478011f

BSidesLV Preview: How to Make Your Security Program Not Suck

July 01, 2014 Added by:Anthony M. Freed

With the August 5th & 6th show fast approaching, we are continuing our series highlighting some of the coolest presentations that are scheduled to take place at Security BSides Las Vegas.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Choosing the Right Entry Point for a Software Security Program

June 30, 2014 Added by:Rafal Los

The topic of software security, or AppSec, has once again cropped up recently in my travels and conversations so I thought it would be prudent to address that here on the blog.

Comments  (0)

65be44ae7088566069cc3bef454174a7

10 Big Data Analytics Privacy Problems

June 30, 2014 Added by:Rebecca Herold

The power of big data analytics is so great that in addition to all the positive business possibilities, there are just as many new privacy concerns being created. Here are ten of the most significant privacy risks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

IoT: Get Security Right The First Time

June 30, 2014 Added by:Patrick Oliver Graf

While there’s excitement about IoT’s potential to create new business and boost productivity and convenience, the technology community can’t forget about security.

Comments  (0)

296634767383f056e82787fcb3b94864

Have Lunch on K Street with Execs from Microsoft, BAE, Cognizant, Huawei USA, and the IC

June 28, 2014 Added by:Jeffrey Carr

If you're a cyber security startup, chances are good that you may have a product or service of interest to the U.S. government but do you know the complexities that come with that? If you attend our Security Startup Lunch in DC on July 22, you can ask Hendrik van der Mueler, Barbara Hunt, and Lewis Shepherd for their advice.

Comments  (0)

Dea535178c7cc66cd64a57946b006ef2

Key Management in the Public Cloud

June 27, 2014 Added by:HyTrust

Key management is the most important component in any enterprise-grade encryption system. Yet what is the right key management model if you are looking to the cloud?

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Essentials? Basics? Fundamentals? Bare Minimum?

June 25, 2014 Added by:Anton Chuvakin

Let’s think together – what technologies and practices constitute information security essentials?

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why a User-Centric Approach is Required for Network Security

June 25, 2014 Added by:Patrick Oliver Graf

With employees demanding network access for many different types of devices, operating systems and applications, a CIO’s job has never been harder. But do employees always know what’s best for network security?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Big Data's Big Promise Isn't Here Yet

June 24, 2014 Added by:Tripwire Inc

What is interesting to me is how much hope people have for big data being the savior of the security world. I don’t believe that’s going to happen anytime soon.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Keep it Simple

June 24, 2014 Added by:PCI Guru

Let us refocus our priorities and help the vast majority of the world get secure.

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

What’s the Best Tool for the Job?

June 24, 2014 Added by:Jack Daniel

I thought back to my favorite patch and systems management tools from past jobs when I ran mixed (but mostly Windows) networks for small businesses. That reminded me of a lesson about tools I learned many years ago.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »