Latest Blog Posts
November 13, 2014 Added by:Brent Huston
Almost all organizations dread writing security policies. When I ask people why this process is so intimidating, the answer I get most often is that the task just seems overwhelming and they don’t know where to start.
November 13, 2014 Added by:Joe Weiss
Risk is defined as frequency times consequence. There is little information on frequency of ICS cyber attacks.
November 12, 2014 Added by:Tripwire Inc
More and more organisations today have some airgapped computers, physically isolated from other systems with no Internet connection to the outside world or other networks inside their company.
November 12, 2014 Added by:Brent Huston
Scoping an enterprise-level risk assessment can be a real guessing game.
November 11, 2014 Added by:Patrick Oliver Graf
In today’s business environment, the list of overlooked network security threats is endless. Information security professionals are modern-day gladiators, tasked with defending corporate data and networks against both known and unknown threats, but no matter how skilled they are, there will always be new threats to their networks.
November 10, 2014 Added by:Electronic Frontier Foundation
In order to have confidence in any software that has security implications, we need to know that it is has been reviewed for structural design problems and is being continuously audited for bugs and vulnerabilities in the code.
November 05, 2014 Added by:Patrick Oliver Graf
To make sure remote workers are able to safely access their corporate network, administrators need to make sure that all endpoints – the company-owned devices employees use for remote work – are secure.
November 05, 2014 Added by:Steve Durbin
Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.
November 04, 2014 Added by:Electronic Frontier Foundation
In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users' web traffic on its network to inject a cookie-like tracker.
November 03, 2014 Added by:Brent Huston
It is true that the most attacks against information systems come from external attackers, but that does not mean the internal threat is negligible.