Network Access Control
September 15, 2014 Added by:Joe Weiss
The electric grid has been, and continues to be, susceptible to unintentional and malicious cyber incidents.
September 15, 2014 Added by:Greg Akers
Teams that use intelligence inherent in the network will gain insight into how cyber actors operate and how to quickly shut them down.
September 11, 2014 Added by:Thu Pham
If you needed more proof that authentication attacks are on the rise, look no further than the recent JP Morgan Chase data breach.
September 10, 2014 Added by:Tripwire Inc
SSL implementation problems exist in apps of all shapes, sizes and function, ranging from those with little sensitive data and few users to apps with millions of active users handling some of our most sensitive data, such as financial transactions and account login information.
September 10, 2014 Added by:Patrick Oliver Graf
The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...
August 27, 2014 Added by:Dan Dieterle
According to the report, a security audit of NOAA’s Information Technology security program found serious security issues with the JPSS Ground System which gathers information from weather satellites and provides it to worldwide users.
August 26, 2014 Added by:Patrick Oliver Graf
Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.
August 21, 2014 Added by:Identropy
An identity management implementation project will often extend 18-36 months based on the size and complexity of the organization. This is an extraordinary amount of time for any project sponsor to maintain passion around the project.
August 21, 2014 Added by:Joe Weiss
August 19th, I spent a day with the NERC Critical Infrastructure Protection (CIP) Version 5 Drafting team working on one of the NERC CIP Standards. The focus was on boundary protection, not on the actual control system devices and serial communications which were explicitly excluded.
August 20, 2014 Added by:Tripwire Inc
In our third and final post of this series, Tripwire’s Vulnerability and Exposure Research Team (VERT) highlights four more unnecessary risks that often appear in even the most secure networks.
August 19, 2014 Added by:Patrick Oliver Graf
If awards were given out at Black Hat 2014, one nominee for “Exploit of the Conference” would have won in a runaway – the “BadUSB” exploit.
August 14, 2014 Added by:Patrick Oliver Graf
It’s Groundhog Day all over again for retailers, following the U.S. Department of Homeland Security’s warning that they could, once again, be exploited by malicious actors.
August 13, 2014 Added by:Joe Weiss
There is still a prevailing view that control system cyber security is not real and the cost of addressing it is not commensurate with the 'benefits'.
Good Security Starts at Home... Amire sohail on 10-30-2014
Is BYOD a Nightmare for IT Security or a Dre... Yuri Andrew on 10-30-2014
New Zero-day in Microsoft OLE Being Exploite... Lisa Harris on 10-30-2014