Network Access Control

7ddc1f3000a13e4dfec28074e9e7b658

Why the FCC Can't Actually Save Net Neutrality

January 27, 2014 Added by:Electronic Frontier Foundation

Some people have condemned last week’s court decision to reject the bulk of the Federal Communications Commission’s (FCC) Open Internet Order as a threat to Internet innovation and openness. Others hailed it as a victory against dangerous government regulation of the Internet. Paradoxically, there is a lot of truth to both of these claims.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Israeli Defense Systems Hacked with Xtreme RAT Trojan

January 27, 2014 Added by:Anthony M. Freed

The attackers used a spear-phishing email designed to look like it was sent by the country’s Shin Bet secret security service which contained a malicious attachment that infected the systems with the Xtreme RAT software, a remote access tool.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Business Impact Analysis: A Good Way to Jumpstart an Information Security Program

January 27, 2014 Added by:Brent Huston

BIA (business impact analysis) is traditionally seen as part of the business continuity process. It helps organizations recognize and prioritize which information, hardware and personnel assets are crucial to the business so that proper planning for contingency situations can be undertaken.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacking Your Way Through Airports and Hotels

November 16, 2013 Added by:Anthony M. Freed

Want to know how to hack travelers and hotel networks in a matter of minutes? On a recent trip, Nabil Ouchn (@toolswatch) decided to do some some security analysis with a piece of hardware called the PwnPad – a penetration testing tablet – and a few other tools to see what kind of mischief he could get into.

Comments  (2)

Ffc4103a877b409fd8d6da8f854f617e

Industrial Control Industry Slow to Adopt Security Configuration Management: Survey

November 13, 2013 Added by:InfosecIsland News

Tripwire unveiled the results of a study comparing risk-based security management in the industrial sector to that of other industries.

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Road To Identity Relationship Management

November 04, 2013 Added by:Simon Moffatt

The modern enterprise workforce, will contain contractors, freelancer and even consumers themselves. Bloggers, reviewers, supporters, promoters, content sharers and affiliates, whilst not on the company payroll, help drive revenue through messaging and interaction. If a platform exists where their identity can be harnessed, a new more agile go to market approach can be developed.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Developing a Comprehensive Remote Access Security Framework: Identities and Roles

October 22, 2013 Added by:Patrick Oliver Graf

Every enterprise should consider implementing a comprehensive remote access security framework in light of increased workplace mobility and the BYOD trend.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Terrorism – See Something, Say Something

August 08, 2013 Added by:Jon Stout

he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security Failures: Value of the Human Firewall

August 07, 2013 Added by:Jon Stout

The computing security model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, system event monitoring, VPNs, etc., is failing to detect and block the most advanced malware. That is serious enough. But what’s worse is that this traditional defense model is of little use in preventing what many experts feel is the greatest threat to cyber security: human e...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Social Engineering – A True Case Study

August 01, 2013 Added by:Jon Stout

There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security – Is Offensive Cyber Security Necessary?

July 31, 2013 Added by:Jon Stout

The country is at war and it is a cyber security war. The enemies are many, diverse and competent and fighting a defensive war is not the best way to win. Cyber security war is like any other war- taking the offensive will improve your chances of success. Like any other war, the cyber security war requires proper planning for success and a total winning strategy. Half hearted measures will not ...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Top Secret SCI Jobs - The Value of Smaller Contractors

July 30, 2013 Added by:Jon Stout

You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.

Comments  (0)

Default-avatar

NSS Labs' Defense In Depth Testing Reveals Weaknesses In Traditional Layered IT Security Strategies; No Clear And Present Winners

July 10, 2013 Added by:Joe Franscella

At the end of May, NSS Labs released its Correlation of Detection Failures report. In an accompanying news release, Are Security Professionals Overconfident in “Defense in Depth?”, the company said it was the culmination of a comprehensive in-lab test revealing that popular layered technology combinations are failing to protect organizations against exploits.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

There is no Onion - The Painful Reality of Defense in Depth

June 26, 2013 Added by:Rafal Los

Imagine if you woke up tomorrow morning and it was conclusively proven that the layered onion model was proven to fail in several circumstances commonly deployed and used in today’s enterprise. That would sure explain much of the failure we’ve seen across enterprise breaches, wouldn’t it?

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cyber Attacks the Reality, the Reason and the Resolution Part 3

June 24, 2013 Added by:Larry Karisny

Knowing the reality and reasons behind cyberattacks, it’s time to stop talking and start offering resolution to these serious problems. There is no "it won’t happen to me" anymore. We must immediately deploy prevention and detection technologies to our critical processes or frankly, we could lose it all.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »