Network Access Control

7ddc1f3000a13e4dfec28074e9e7b658

Let's Encrypt (the Entire Web): 2014 in Review

January 06, 2015 Added by:Electronic Frontier Foundation

We've been pursuing the ideas that turned into Let's Encrypt for three years, so it was a great pleasure to be able to share what we've been working on with the world.

Comments  (4)

F45df53d99605d46f5ae32b7bed9fe22

Does Your Valuable Data Belong to Hackers?

January 05, 2015 Added by:Thu Pham

Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.

Comments  (5)

65be44ae7088566069cc3bef454174a7

Addressing Mobile Risks in 2015

January 01, 2015 Added by:Rebecca Herold

We are literally putting more responsibility for the security of our business assets into the hands of our employees.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

3 New Year’s Resolutions for Network Administrators

December 31, 2014 Added by:Patrick Oliver Graf

Although it’s been a historically troubling year for the cybersecurity community, the advantage of a new year is that network administrators can make a fresh start.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Right Security Framework For Your Small Business

December 30, 2014 Added by:Tripwire Inc

A great way to begin to secure your organization is to get a baseline of where you are now and set goals to improve your security stature.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

NSA Published Reports Containing Declassified Compliance Errors

December 29, 2014 Added by:Pierluigi Paganini

The National Security Agency (NSA) has released a collection of compliance reports that details failures and errors in compliance to US laws on surveillance.

Comments  (0)

0ead717779244d9aab5c1699308850d2

JPMorgan Hackers Compromised Server Unprotected by Two-factor Authentication

December 24, 2014 Added by:Brian Prince

A server that lacked two-factor authentication was the gateway hackers used to breach JPMorgan Chase this year, according to a report.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

Hacking the Internet of Things: Beware of the Toasters

December 24, 2014 Added by:Tripwire Inc

In previous posts, we’ve discussed using refrigerators as literal bombs launched by catapults and fridges used as bots to execute denial-of-service attacks against hapless networks. But now, all that is small potatoes when you think about the rapid push towards the creation of the Internet of Things.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

The Holidays Bring Both Cheer and Fear to Network Administrators

December 23, 2014 Added by:Patrick Oliver Graf

Almost one year ago to the day, the “most wonderful time of the year” became anything but for millions of Americans when news of the Target data breach broke. Not only did that attack force us all to think twice about how our digital information is managed, it forever changed the network security landscape and put IT administrators in a perpetual state of high alert.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

What Network Security Lessons Can We Learn from the Sony Attack?

December 17, 2014 Added by:Patrick Oliver Graf

Hollywood is a place that can be driven mad by star-studded gossip, where the talk of the town is rarely private and where people are accustomed to their secrets not staying secret for very long. Yet, this state of play hasn’t made it any easier for the victims of last month's cyberattack against Sony, carried out by shadowy assailants calling themselves the Guardians of Peace.

Comments  (15)

03b2ceb73723f8b53cd533e4fba898ee

Grinch Bug Could be Worse Than Shellshock, Says Experts

December 17, 2014 Added by:Pierluigi Paganini

The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel.

Comments  (1)

65be44ae7088566069cc3bef454174a7

The 3 Necessary Elements for Effective Information Security Management

December 15, 2014 Added by:Rebecca Herold

In addition to many really huge organizations, I’ve worked with hundreds of small to midsize businesses over the years. I’ve seen a large portion of the small to midsize organizations completely omitting not just one, but two and in many situations all three of these core elements.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Security Backdoors are Bad News—But Some Lawmakers Are Taking Action to Close Them

December 11, 2014 Added by:Electronic Frontier Foundation

As many privacy advocates have pointed out recently, it looks like some people in the federal government are intent on reviving the failed Crypto Wars of the 90s.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

POODLE Redux: Now Affecting Some TLS Implementations

December 10, 2014 Added by:Tripwire Inc

Although vendors of tools that were vulnerable to the flaw quickly fixed their systems to rely on TLS vs SSL v3, a problem still exists due to TLS padding being a subset of SSLv3’s so that decoding functions for SSLv3 can be used with TLS, as well.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Hackers Leak Scripts, Celebrity Phones and Aliases at Sony Pictures Entertainment

December 10, 2014 Added by:Pierluigi Paganini

GOP released a new archive of Sony Pictures Entertainment confidential data including private information of employees, celebrity phone numbers, film scripts and many more.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

The Trouble with the Endpoint

December 09, 2014 Added by:Patrick Oliver Graf

Much to the dismay of network administrators, IT security today is complex and multi-faceted, from the varied attack vectors to the different types of attackers themselves. But there is always one constant: the endpoint.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »