Network Access Control

Bd07d58f0d31d48d3764821d109bf165

CERT Pudding and the War on Bad SSL

September 10, 2014 Added by:Tripwire Inc

SSL implementation problems exist in apps of all shapes, sizes and function, ranging from those with little sensitive data and few users to apps with millions of active users handling some of our most sensitive data, such as financial transactions and account login information.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Who Will Foot the Bill for BYOD?

September 10, 2014 Added by:Patrick Oliver Graf

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Brazilian Cyber Criminals Targeting Home Routers

September 03, 2014 Added by:Pierluigi Paganini

Experts at Kaspersky Lab have uncovered a hacking campaign conducted by Brazilian threat actors which is targeting home routers by using a web-based attack.

Comments  (0)

9ef2480a65cde87091d69a3b8a7fec3a

Why What You Don’t Know, May Hurt You

August 28, 2014 Added by:Stephen Dodson

We are no longer dealing with teenage hackers or disgruntled young adults with a political or social ax to grind. The real threat to your security comes from advanced cybercriminal organizations.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Thousands of Vulnerabilities in NOAA Satellite System

August 27, 2014 Added by:Dan Dieterle

According to the report, a security audit of NOAA’s Information Technology security program found serious security issues with the JPSS Ground System which gathers information from weather satellites and provides it to worldwide users.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Are Connected Cars on a Collision Course with Network Security?

August 26, 2014 Added by:Patrick Oliver Graf

Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Preparing for a Successful IAM Integration Project (Part 2 of 2)

August 21, 2014 Added by:Identropy

An identity management implementation project will often extend 18-36 months based on the size and complexity of the organization. This is an extraordinary amount of time for any project sponsor to maintain passion around the project.

Comments  (3)

201d6e4b7cd0350a1a9ef6e856e28341

NERC CIPS and Keeping Lights On – Are They the Same?

August 21, 2014 Added by:Joe Weiss

August 19th, I spent a day with the NERC Critical Infrastructure Protection (CIP) Version 5 Drafting team working on one of the NERC CIP Standards. The focus was on boundary protection, not on the actual control system devices and serial communications which were explicitly excluded.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Vulnerability Management: Just Turn It Off! PART III

August 20, 2014 Added by:Tripwire Inc

In our third and final post of this series, Tripwire’s Vulnerability and Exposure Research Team (VERT) highlights four more unnecessary risks that often appear in even the most secure networks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

‘BadUSB’ Malware Leaves Terrible Taste at Black Hat 2014

August 19, 2014 Added by:Patrick Oliver Graf

If awards were given out at Black Hat 2014, one nominee for “Exploit of the Conference” would have won in a runaway – the “BadUSB” exploit.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

It’s Time for Retailers to Tell Point-of-Sale Hackers to ‘Back Off’

August 14, 2014 Added by:Patrick Oliver Graf

It’s Groundhog Day all over again for retailers, following the U.S. Department of Homeland Security’s warning that they could, once again, be exploited by malicious actors.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Real Cost of Control System Cyber Security – And it isn’t Cheap

August 13, 2014 Added by:Joe Weiss

There is still a prevailing view that control system cyber security is not real and the cost of addressing it is not commensurate with the 'benefits'.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Google Boosts Secure Sites in Search Results

August 11, 2014 Added by:Electronic Frontier Foundation

In a bold and welcome move to protect users, Google announced on Wednesday that they have started prioritizing sites offering HTTPS (HTTP over TLS) in their page ranking algorithm.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Poor Communication Leads to Defeat on the Network Security Battlefield

August 11, 2014 Added by:Patrick Oliver Graf

During wartime, information can create just as much of an advantage for one side as the size of an army or the weapons they hold. That is, as long as this information is accurate, passed along to the right people and then acted upon quickly.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

“Stop The Pain” Thinking vs the Use Case Thinking

August 07, 2014 Added by:Anton Chuvakin

As I’ve written many times, SIEM is a “force multiplier”, but this definition implies that you have something to multiply. If you have 0 capabilities, a purchase of a SIEM tool will still leave you at – you guessed it!—0.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Another Washington Think Tank Paper on Critical Infrastructure - Another Miss

August 07, 2014 Added by:Joe Weiss

As with the other papers, the paper chairs reflect the upper strata in political Washington. Unfortunately, like the other papers, there is a lack of control system expertise that has been applied even though I was told more than 200 people worked on the paper.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »