Latest Blog Posts

03b2ceb73723f8b53cd533e4fba898ee

Is the Agent.btz malware the link between Snake and Red October?

March 13, 2014 Added by:Pierluigi Paganini

The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red October campaign.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security Slice: World War XP

March 12, 2014 Added by:Tripwire Inc

Are these nine tips enough to protect organizations that need to continue using XP?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Attacking the ROI of Advanced Persistent Threats

March 12, 2014 Added by:Tripwire Inc

How do you stop a smart attacker? Simple: reduce their ROI to make exploiting you fiscally irresponsible.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Here a box, there a box, everywhere a box … breached

March 11, 2014 Added by:Rafal Los

Let’s face it: The industry has a ‘box problem.’ And everyone will sell you a solution to what ails you.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Russian “Cyber” Snake attacking Ukrainian Systems

March 11, 2014 Added by:Dan Dieterle

Everyone is expecting Russia to attack Ukrainian computer systems, but the truth may be that they have been doing so right along.

Comments  (0)

C4080c49428ff549dad480c049cf594b

Does Auditing Have a Role in Your Security Strategy?

March 11, 2014 Added by:Michael Fimin

In order to figure out where auditing should play a part in your security strategy, let’s start by defining what should be audited as part of a security plan. To do this, look first at how security is implemented in its most simple form and work backwards to auditing’s role in your strategy.

Comments  (2)

21d6c9b1539821f5afbd3d8ce5d96380

PerspecSys Survey Reveals Cloud-based Security Concerns for 2014

March 10, 2014 Added by:Kevin L. Jackson

After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overwhelming 74 percent believe security for cloud-based data in 2014 will be a bigger concern than securing data on-premise."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF to the United Nations: Protect Individuals Right to Privacy in The Digital Age

March 10, 2014 Added by:Electronic Frontier Foundation

We call upon the Human Rights Committee to note the thirteen 13 International Principles for the Application of Human Rights to Communications Surveillance...as a guidance for understanding a State Party’s compliance with Article 17 on the right to privacy.

Comments  (0)

Fafdf1720f4df1d41c6eacbd2429a06b

Smart Card Logon: The Good, the Bad and the Ugly

March 10, 2014 Added by:Tal Be'ery

Organizations may find themselves in a “PCI’s Catch 22″ situation: Implementing PCI’s recommended Smart Card Logon for Windows may be in breach of another PCI requirement: to change passwords on a regular basis.

Comments  (1)

6d117b57d55f63febe392e40a478011f

Security Skills and Personnel Gap Creates National Security Crisis

March 07, 2014 Added by:Anthony M. Freed

The growing cybersecurity skills and personnel gap that makes recruiting and retaining personnel with the prerequisite expertise increasingly difficult for both the public and private sectors may have reached a point where it has become “a national security crisis,” according to statements from Art Gilliland, SVP and general manager, Enterprise Security Products for HP.

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Android Webview Exploit Tutorial

March 06, 2014 Added by:Dan Dieterle

Around 70% of all Android devices in the field are subject to a Javascript exploit that could allow an attacker remote access to your phone by doing nothing more than surfing to a malicious page or scanning in a malicious QR Code.

Comments  (0)

924ce315203c17e05d9e04b59648a942

What Will A Russia-Ukraine Cyberwar Look Like?

March 06, 2014 Added by:Richard Stiennon

Five and a half years since Georgia we can expect a little more sophistication in the arsenal that Russia can bring to bear.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

White House Cybersecurity Director Calls on Business to Help Safeguard Critical Infrastructure

March 06, 2014 Added by:InfosecIsland News

On the heels of the Obama Administration's release of guidelines to protect the nation's essential infrastructure from cyber attacks,White House Director for Cybersecurity Critical Infrastructure Protection Samara N. Moore will headline an open discussion at the NYU Polytechnic School of Engineering about the implications for businesses in key industries.

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Could Your Business Survive If Everyone Telecommuted?

March 06, 2014 Added by:Allan Pratt, MBA

Before any employee becomes a telecommuter, written telecommuting policies must be presented to and discussed with the employee – and then signed by the employee. Otherwise, telecommuting shouldn’t be an option.

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

NCOIC Debuts Roadmap for Designing, Managing Cyber-secure Hybrid Computing Environment

March 05, 2014 Added by:Kevin L. Jackson

Known as the NCOIC Rapid Response Capability (NRRC™), the process defines how to build a federated cloud infrastructure that provides a foundation for information sharing within a secure environment

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On Threat Intelligence Sources

March 05, 2014 Added by:Anton Chuvakin

Where does threat intelligence come from?

Comments  (0)


« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »