Latest Blog Posts


Is the Agent.btz malware the link between Snake and Red October?

March 13, 2014 Added by:Pierluigi Paganini

The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red October campaign.

Comments  (0)


Security Slice: World War XP

March 12, 2014 Added by:Tripwire Inc

Are these nine tips enough to protect organizations that need to continue using XP?

Comments  (0)


Attacking the ROI of Advanced Persistent Threats

March 12, 2014 Added by:Tripwire Inc

How do you stop a smart attacker? Simple: reduce their ROI to make exploiting you fiscally irresponsible.

Comments  (0)


Here a box, there a box, everywhere a box … breached

March 11, 2014 Added by:Rafal Los

Let’s face it: The industry has a ‘box problem.’ And everyone will sell you a solution to what ails you.

Comments  (0)


Russian “Cyber” Snake attacking Ukrainian Systems

March 11, 2014 Added by:Dan Dieterle

Everyone is expecting Russia to attack Ukrainian computer systems, but the truth may be that they have been doing so right along.

Comments  (0)


Does Auditing Have a Role in Your Security Strategy?

March 11, 2014 Added by:Michael Fimin

In order to figure out where auditing should play a part in your security strategy, let’s start by defining what should be audited as part of a security plan. To do this, look first at how security is implemented in its most simple form and work backwards to auditing’s role in your strategy.

Comments  (2)


PerspecSys Survey Reveals Cloud-based Security Concerns for 2014

March 10, 2014 Added by:Kevin L. Jackson

After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overwhelming 74 percent believe security for cloud-based data in 2014 will be a bigger concern than securing data on-premise."

Comments  (0)


EFF to the United Nations: Protect Individuals Right to Privacy in The Digital Age

March 10, 2014 Added by:Electronic Frontier Foundation

We call upon the Human Rights Committee to note the thirteen 13 International Principles for the Application of Human Rights to Communications a guidance for understanding a State Party’s compliance with Article 17 on the right to privacy.

Comments  (0)


Smart Card Logon: The Good, the Bad and the Ugly

March 10, 2014 Added by:Tal Be'ery

Organizations may find themselves in a “PCI’s Catch 22″ situation: Implementing PCI’s recommended Smart Card Logon for Windows may be in breach of another PCI requirement: to change passwords on a regular basis.

Comments  (1)


Security Skills and Personnel Gap Creates National Security Crisis

March 07, 2014 Added by:Anthony M. Freed

The growing cybersecurity skills and personnel gap that makes recruiting and retaining personnel with the prerequisite expertise increasingly difficult for both the public and private sectors may have reached a point where it has become “a national security crisis,” according to statements from Art Gilliland, SVP and general manager, Enterprise Security Products for HP.

Comments  (2)


Android Webview Exploit Tutorial

March 06, 2014 Added by:Dan Dieterle

Around 70% of all Android devices in the field are subject to a Javascript exploit that could allow an attacker remote access to your phone by doing nothing more than surfing to a malicious page or scanning in a malicious QR Code.

Comments  (0)


What Will A Russia-Ukraine Cyberwar Look Like?

March 06, 2014 Added by:Richard Stiennon

Five and a half years since Georgia we can expect a little more sophistication in the arsenal that Russia can bring to bear.

Comments  (0)


White House Cybersecurity Director Calls on Business to Help Safeguard Critical Infrastructure

March 06, 2014 Added by:InfosecIsland News

On the heels of the Obama Administration's release of guidelines to protect the nation's essential infrastructure from cyber attacks,White House Director for Cybersecurity Critical Infrastructure Protection Samara N. Moore will headline an open discussion at the NYU Polytechnic School of Engineering about the implications for businesses in key industries.

Comments  (0)


Could Your Business Survive If Everyone Telecommuted?

March 06, 2014 Added by:Allan Pratt, MBA

Before any employee becomes a telecommuter, written telecommuting policies must be presented to and discussed with the employee – and then signed by the employee. Otherwise, telecommuting shouldn’t be an option.

Comments  (0)


NCOIC Debuts Roadmap for Designing, Managing Cyber-secure Hybrid Computing Environment

March 05, 2014 Added by:Kevin L. Jackson

Known as the NCOIC Rapid Response Capability (NRRC™), the process defines how to build a federated cloud infrastructure that provides a foundation for information sharing within a secure environment

Comments  (0)


On Threat Intelligence Sources

March 05, 2014 Added by:Anton Chuvakin

Where does threat intelligence come from?

Comments  (0)

« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »