Latest Blog Posts

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes November 2015 - Review

November 11, 2015 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for November 2015. This patch update closes 23 vulnerabilities in SAP products.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Observations From the 2015 ICS Cyber Security Conference

November 10, 2015 Added by:Joe Weiss

2015 ICS Cyber Security Conference – Neither the Grid, Nuclear Plants, or other Undustries are Cyber Secure

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes October 2015 - Review

November 10, 2015 Added by:Alexander Polyakov

SAP released the monthly critical patch update for October 2015. This patch update closes 29 vulnerabilities in SAP products, 15 of which are high priority, some of them belong to the SAP HANA security area.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Complex and Portable Passwords

November 10, 2015 Added by:Jayson Wylie

A person needing to keep and collect passwords for resources, throughout their lives, can create situations where maintaining them requires constant resets or means that could lack security.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Afaria Stored XSS vulnerability - detailed review

October 21, 2015 Added by:Alexander Polyakov

Today we will show how SAP Afaria, an MDM solution from a world-famous software vendor, works and how cybercriminals can attack it in different ways.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Boards Must Understand the Risks from Industrial Control Systems (ICS) Cyber Security

October 12, 2015 Added by:Joe Weiss

The Boards of Directors function is to identify and judge risk to the organization. As one member of a utility board stated, “A Board needs to know what the company is exposed to in terms of risk and what the consequences are of that exposure. Given a specific security deployment protecting an asset – what possibilities exist for breach?

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Crowd Funding Website Breached! Access to Development Server To Blame

October 08, 2015 Added by:Peter Zavlaris

Patreon, the crowd funding website, suffered a breach late last month. The cause was an unguarded development server, which was left online. According to Patreon’s CEO, Jack Conte, the development server was accessed by a third party, and customer contact information was stolen.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

How Well Do You Really Know Your Network?

October 06, 2015 Added by:Dan Lohrmann

Recent data breaches, and the international emphasis on critical infrastructure protection, are helping raise awareness of the importance of technology infrastructure improvements. Many organizations are currently building “next-generation” networks with new projects that are well funded. Don’t waste any opportunity to reinvent your network or infrastructure when you get the chance.

Comments  (0)

306708aaf995cf6a77d3083885b60907

NSA Cyber Chief to Keynote 2015 ICS Cyber Security Conference in Atlanta

October 06, 2015 Added by:Mike Lennon

Philip D. Quade, Chief of the NSA Cyber Task Force and Special Assistant to the Director National Security Agency for Cyber, will deliver a keynote address at the 2015 ICS Cyber Security Conference, taking place Oct. 26-29 in Atlanta, Georgia.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

The Necessity of Cloud Delivered Integrated Security Platforms

September 28, 2015 Added by:InfosecIsland News

Forrester Consulting conducted an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models. Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from this research, including:

Comments  (0)

D35585b7d1a9ebbeb200b032aac3606a

A Sharing Economy for Security

September 25, 2015 Added by:Anne Bonaparte

Hackers trade information to make their attacks more effective. If organizations want to beat back the bad guys, they must also learn to share.

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Can CTF Players Replace Professional Penetration Testers?

September 23, 2015 Added by:Ilia Kolochenko

The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

3 out of 4 Consumers Will Leave your Websites Because of Security Concerns

September 22, 2015 Added by:Peter Zavlaris

As part of the ongoing battle for eyeballs, marketing departments implement tracking technologies that encroach on customer privacy, while digital assets are cobbled together from third-party technology to accelerate time-to-market.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Red Hat Warns of Ceph Website Breach

September 19, 2015 Added by:Eduard Kovacs

Red Hat has detected a breach on two Ceph storage system websites and the integrity of the signing keys has been compromised.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The 2015 ICS Cyber Security Conference

September 18, 2015 Added by:Joe Weiss

The 2015 ICS Cyber Security Conference will be October 26-29 at the Georgia Tech Hotel and Conference Center in Atlanta (www.icscybersecurityconference.com ). This will be the 15th in a series that began in 2002. The Conference will have some new twists, but will also stay true to its roots - ICS cyber security and what makes ICS cyber security different. Specifically, there will be....

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

FS-ISAC to Share Threat Intelligence With Federal Reserve Banks

September 16, 2015 Added by:InfosecIsland News

The Financial Services Information Sharing and Analysis Center (FS-ISAC) announced an arrangement with the Federal Reserve Banks to provide direct access to FS-ISAC security threat information to over 10,000 of their financial institution customers.

Comments  (0)


« First < Previous | 4 - 5 - 6 - 7 - 8 | Next > Last »