Network Access Control
May 28, 2015 Added by:Anthony M. Freed
The Institute of Electrical and Electronics Engineers (IEEE) has taken the lead in medical device security standards with the release of Building Code for Medical Device Software Security, a set of guidelines to encourage companies to establish a secure baseline for medical software development and production practices.
May 27, 2015 Added by:Peter Zavlaris
This year’s Verizon Data Breach Investigations Report (VDBIR) added a new category to its VERIS (Vocabulary for Event Recording and Incident Sharing) to track attacks with “secondary” motives.
May 27, 2015 Added by:Patrick Oliver Graf
So, should network administrators consider tapping into MSPs for network security in our current environment? The core issue is a common one in network security – convenience vs. security.
May 25, 2015 Added by:Joe Weiss
One of the most important aspects in addressing ICS cyber security is the concept of “systems of systems”. Unlike IT where you can test a box and label it and the system secure, control system cyber security requires testing the overall system.
May 21, 2015 Added by:Jonathan Curtis
This comparison is quite analogous to the differences I’ve experienced between simple threat feeds and premium threat intelligence offerings. I’ll let you draw your own conclusion as to how.
May 20, 2015 Added by:Brian Prince
The first quarter of the year set a record for the number of DDoS attacks observed across Akamai's Prolexic network, with the total number of attacks being more than double the number recorded in the first quarter of 2014.
May 19, 2015 Added by:Eduard Kovacs
A researcher who specializes in aircraft security admitted hacking into an airplane’s systems during a flight and successfully sending a climb command to one of the engines, according to an FBI search warrant application.
May 19, 2015 Added by:Anthony M. Freed
A new study based on the assessment of hundreds of SAP implementations found that over 95% of SAP systems were exposed to vulnerabilities that could lead to full compromise of an organization’s critical data.
May 18, 2015 Added by:Tripwire Inc
Over the last year or so, it has become increasingly obvious that there is a uniformity related to technology failures, and more than one would be expected to encounter.
May 14, 2015 Added by:Anthony M. Freed
Vulnerable network devices such as unprotected routers and printers are fueling an increase in the number and magnitude of distributed denial of service (DDoS) attacks, many of which are employing reflection amplification techniques.
May 14, 2015 Added by:Brian Prince
Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.
May 07, 2015 Added by:Brian Prince
The malware, known as Rombertik, is the latest in a long line of examples of malware designed to make the lives of analysts and researchers harder.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015