Latest Blog Posts

6a71825dbf6d876764b845e0fd664e0b

The Risks of Roaming: Cloud-Based Web Security a Must for Mobile Workers

October 20, 2014 Added by:Paul Lipman

In just the last few years we have become a world of roamers.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Hacker Myths Debunked

October 20, 2014 Added by:Tripwire Inc

Ethical hacking can improve the security of various products, whereas malicious hacking seeks to undermine data integrity. It’s how people hack which shapes the nature of a particular incident.

Comments  (0)

F45df53d99605d46f5ae32b7bed9fe22

The True Cost of a Data Breach

October 20, 2014 Added by:Thu Pham

iThemes, a WordPress (WP) security provider, was recently breached and approximately 60,000 clients in their membership database had a slew of information stolen, including usernames, passwords, IP addresses and more. But, what is of particular concern is the fact that the company was storing their members’ passwords in plain text, which they admitted was in error in a 

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

The ASV Process Is Broken – Part 1

October 20, 2014 Added by:PCI Guru

The topic of ASV scanning came up as usual at the 2014 PCI Community Meeting. The questions all seemed to revolve around how to obtain a passing scan.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Last Chance to Register for 2014 ICS Cyber Security Conference

October 17, 2014 Added by:InfosecIsland News

On Monday, October 20, 2014, attendees from around the world will gather in Atlanta, Georgia for the 2014 Industrial Control Systems (ICS) Cyber Security Conference.

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

The Chinese Truly are Attacking our Critical Infrastructure

October 17, 2014 Added by:Joe Weiss

Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Acting on MSSP Alerts

October 16, 2014 Added by:Anton Chuvakin

Security incidents call for an immediate incident response (by definition), while alerts need to be reviewed via an alert triage process in order to decide whether they indicate an incident, a minor “trouble” to be resolved immediately, a false alarm or a cause to change the alerting rules in order to not see it ever again.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

When Remote Access Becomes Your Enemy

October 16, 2014 Added by:Patrick Oliver Graf

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Security Companies Hit Hikit Backdoor Used by APT Group

October 16, 2014 Added by:Brian Prince

A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Spying Flashlight Apps Reveal User Inattentiveness to Cyber Security

October 15, 2014 Added by:Tripwire Inc

What we often don’t realize, however, is the amount of personal information our phones actually store and how easily accessible we make this data, not only for ourselves, but for others, too. A recent Android study proves many of us are likely not careful enough.

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Introducing the Shoulders of InfoSec Project

October 15, 2014 Added by:Jack Daniel

In information security we have a very bad habit of ignoring the past; many times it isn’t even a failure to remember, it is a failure to ever have known who and what came before.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

SandWorm Hacking Team Exploited 0-day Against NATO and Other Government Entities

October 14, 2014 Added by:Pierluigi Paganini

According to a new report issued by the cyber security firm iSIGHT Partners, a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and many other entities.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Lessons from Complex, Dynamic Environments

October 14, 2014 Added by:Rafal Los

Security is hard, folks.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Lawyer Or Security Professional?

October 13, 2014 Added by:PCI Guru

It has been an interesting time as the December 31, 2014 deadline approaches and version 2 of the PCI DSS comes to its end of life. I have started to notice that there are a lot of security professionals and others that are closet lawyers based on the discussions I have had with some of you regarding compliance with the PCI DSS.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

How to Build Up Your Secure Development

October 13, 2014 Added by:Tripwire Inc

At some point, your company is going to get the security wake-up call. Whether it’s a breach or an inquiry from an important customer that triggers it, your executives are going to call you one morning, demanding you focus on security in the development of your product.

Comments  (0)

296634767383f056e82787fcb3b94864

First Look at Suits and Spooks DC 2015: 3 Hot Workshops and Over 20 Talks and Panels

October 11, 2014 Added by:Jeffrey Carr

Early bird registration is now open for Suits and Spooks DC. We've expanded it to three days so as to include one optional day of training (Wednesday Feb 4). Since this is Suits and Spooks and not your typical Security conference, you've never had training like this before:

Comments  (0)


« First < Previous | 4 - 5 - 6 - 7 - 8 | Next > Last »