Network Access Control

Af2c9843333cc1e2578ddf18b3eed066

It's Time to Change the Way We Think About the Internet

April 09, 2015 Added by:Peter Zavlaris

The current problem, however, is that while IT has scaled and made tremendous advancements over the last decade, security continues to lag behind.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Control System Cyber Incidents and Why They are so Often Overlooked

April 09, 2015 Added by:Joe Weiss

Cyber security is now a very hot subject. However, the discussions are about IT cyber security and data breaches not control system cyber security and equipment damage.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Lazy Remediation Leaves Most Global 2000 Firms Vulnerable After Heartbleed Flaw: Report

April 08, 2015 Added by:Mike Lennon

As we mark the one-year anniversary of disclosure of the now famous OpenSSL vulnerability (CVE-2014-0160) known as Heartbleed, security firm Venafi has released new research that shows how vulnerable Global 2000 organizations still are as a result of the flaw.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

The Cloud is Covered: VPNs Enhance Data Security in the Cloud

April 08, 2015 Added by:Patrick Oliver Graf

A cloud provider that has to adhere to stringent privacy and compliance regulations typically has more know-how and access to more resources than a small- or medium-size company. But it is just not possible to rely on a cloud provider for every aspect of data security.

Comments  (0)

8f7b2d9100577f77aa8fbb4f51c0366e

Rethinking the Cyber Kill Chain

April 02, 2015 Added by:Invincea

While the underlying framework and conclusions are excellent, there are few entities capable of fully implementing defenses against all aspects of the cyber kill chain for multiple reasons

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

ICS Cyber Incidents – What Relevant Information Actually Exists?

April 02, 2015 Added by:Joe Weiss

There is a need to use the knowledge from previous control system cyber incidents when developing cyber forensics and monitoring technologies, cyber security technologies, training, and to adjust requirements such as the NERC CIPs, Regulatory Guide 5.71/NEI-0809, and CFATS to address what has actually been happening.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack

April 02, 2015 Added by:Electronic Frontier Foundation

Over the past few weeks, China has been using its country's Internet infrastructure to attack political opponents by turning normal users' web browsers into Denial of Service tools.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

mDNS Can Be Used to Amplify DDoS Attacks: Researcher

April 01, 2015 Added by:Eduard Kovacs

A researcher has determined that this behavior can be exploited for information disclosure and amplifying distributed denial-of-service (DDoS) attacks.

Comments  (0)

6d117b57d55f63febe392e40a478011f

NIST: Internet of Things Hampered by Lack of Effective Timing Signals

March 31, 2015 Added by:Anthony M. Freed

As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Are You Prepared for Runaway Deprovisioning in Your IAM Environment? A True-Life Story…

March 31, 2015 Added by:Identropy

Here are a few tips that you may want to include in your planning if you have not developed a response plan for your IAM environment

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

SXSW: Three Cybersecurity, Remote Access Takeaways from Austin

March 30, 2015 Added by:Patrick Oliver Graf

The South by Southwest (SXSW) Interactive Festival wrapped up last week in Austin, Texas, where 65,000 industry movers and shakers learned about some of the most innovative technology expected to hit the market over the next few years. What was on the minds of presenters, panelists, and attendees alike? “The Future” – all of its possibilities and its promise.

Comments  (0)

A70a600d7c593ca50cc6639cd64ed71a

Threat Intelligence: A Force Multiplier for Security Pros

March 26, 2015 Added by:Joseph Pizzo

With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.

Comments  (0)

60dcc0d0012f3056175c01d54c2e1722

Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security

March 26, 2015 Added by:Kevin Watson

The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.

Comments  (0)

0ead717779244d9aab5c1699308850d2

China Named Top Originator of Attack Traffic in Q4 2014: Akamai

March 26, 2015 Added by:Brian Prince

A new report from Akamai Technologies names China as the top source of attack traffic on the Web.

Comments  (0)

B359c06abd8c84e1a224a96ca47af8b9

Understanding Internet Protocol Security (IPsec)

March 25, 2015 Added by:Barracuda Networks

IPSEC is the most popular form of VPN used today. It is important to understand how IPSEC works in order to trouble shoot issues with IPSEC tunnels.

Comments  (0)

6d117b57d55f63febe392e40a478011f

CSIS Issues Recommendations for Threat Intelligence Sharing

March 25, 2015 Added by:Anthony M. Freed

The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »