Network Access Control
November 19, 2014 Added by:Tripwire Inc
Earlier in November, Europol, the FBI and the Department of Homeland Security coordinated a global sting against the “Dark Web” drug trade.
November 19, 2014 Added by:Brent Huston
What I am referring to here is the vulnerability centralization brings to any system. It is great to pay less for electricity and to avoid some of the local blackouts we used to experience, but how many power plants and transmission towers would an enemy have to take out to cripple the whole grid?
November 18, 2014 Added by:Electronic Frontier Foundation
Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.
November 18, 2014 Added by:Patrick Oliver Graf
One year ago today, Target was gearing up for Black Friday sales and projecting a strong end to the year. That was the company’s primary focus. The same could be said for Neiman Marcus and Home Depot. And no one had even heard of Heartbleed or Shellshock yet.
November 17, 2014 Added by:Joe Weiss
In today’s environment with nuclear plants being prime cyber targets, industry should be looking at more not less.
November 13, 2014 Added by:Joe Weiss
Risk is defined as frequency times consequence. There is little information on frequency of ICS cyber attacks.
November 12, 2014 Added by:Tripwire Inc
More and more organisations today have some airgapped computers, physically isolated from other systems with no Internet connection to the outside world or other networks inside their company.
November 05, 2014 Added by:Steve Durbin
Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.
October 27, 2014 Added by:InfosecIsland News
Please join us on Thursday, Oct. 30th at 1PM ET for a special webcast on how Gaps In SSH Security Create an Open Door for Attackers.
October 21, 2014 Added by:Patrick Oliver Graf
Going forward, we have to be prepared for the possibility that private information provided to a third party, like a merchant or a public agency, will be stolen.
October 16, 2014 Added by:Brian Prince
A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.
Ask The Experts: Why Do Security Testing of ... aditya aditya on 12-21-2014
Android Phones in China Hit by Most Costly M... aditya aditya on 12-21-2014
wget DNS-rebinding and Weak Intranet Port Sc... aditya aditya on 12-21-2014