Network Access Control
March 30, 2015 Added by:Patrick Oliver Graf
The South by Southwest (SXSW) Interactive Festival wrapped up last week in Austin, Texas, where 65,000 industry movers and shakers learned about some of the most innovative technology expected to hit the market over the next few years. What was on the minds of presenters, panelists, and attendees alike? “The Future” – all of its possibilities and its promise.
March 26, 2015 Added by:Joseph Pizzo
With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.
Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security
March 26, 2015 Added by:Kevin Watson
The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.
March 26, 2015 Added by:Brian Prince
A new report from Akamai Technologies names China as the top source of attack traffic on the Web.
March 25, 2015 Added by:Anthony M. Freed
The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.
March 24, 2015 Added by:Eduard Kovacs
Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.
March 23, 2015 Added by:Tripwire Inc
Last week, the Internet fell over itself to report on a botnet allegedly comprised of 100,000 smart devices. Things. The Internet of Things had finally attacked!
March 19, 2015 Added by:Steve Durbin
The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.
March 18, 2015 Added by:Tripwire Inc
A key aspect of President Obama’s information sharing acts have been designed to encourage threat sharing to help protect the organizations and networks involved in critical infrastructure. However, while there are many advancements that still need to be made, there are strengths these networks have that can give defenders a strong footing.
March 18, 2015 Added by:Anthony M. Freed
The vast majority of IT leaders in the retail and financial services sectors acknowledge that their organizations are extremely vulnerable to risks posed by insider threats, including those posed by employees, privileged users, and third party partners that are part of the business’s supply chain.
March 16, 2015 Added by:Peter Zavlaris
Hillary Clinton is in hot water for her decision to use a private email domain instead of her government-issued one when she was Secretary of State.
March 11, 2015 Added by:Anthony M. Freed
The Q4 2014 DDoS Trends Report (gated) reveals that the public sector is increasingly being targeted by distributed denial of service (DDoS) attacks.
March 11, 2015 Added by:Eduard Kovacs
Seagate has confirmed the existence of vulnerabilities in Business Storage 2-Bay NAS devices and promised to patch the issues in May.
How Businesses Can Reduce Wearables Security... manthan rathod on 04-09-2015
Lessons From Hillary Clinton's Email Securit... manthan rathod on 04-09-2015
New Facebook Worm Variant Leverages Multiple... manthan rathod on 04-09-2015