Network Access Control
July 08, 2014 Added by:Joe Weiss
This is actually two blogs in one. The first is about DHS releasing critical information they weren’t even asked for. The second is about the lack of progress on addressing a subject that DHS made public.
July 07, 2014 Added by:Patrick Oliver Graf
Former NSA director Keith Alexander pointed out earlier this week that government networks are far from secure, as the NSA and the Department of Defense uncovered more than 1,500 pieces of malware on the U.S. government’s most secret networks.
July 03, 2014 Added by:Steve French
As a virtually ubiquitous technology enabling automation and reliable two-way communications worldwide, SMS mobile messaging has proven crucial for those enterprises with effective data security, incident management and business continuity measures in place.
June 25, 2014 Added by:Anton Chuvakin
Let’s think together – what technologies and practices constitute information security essentials?
June 25, 2014 Added by:Patrick Oliver Graf
With employees demanding network access for many different types of devices, operating systems and applications, a CIO’s job has never been harder. But do employees always know what’s best for network security?
June 23, 2014 Added by:Joe Weiss
Are spies in our ICS networks – who really knows but we really should find out.
June 16, 2014 Added by:Gretchen Hellman
Securing the New IT can seem daunting. However, by broadening your skillsets and seeking to have impactful conversations with business executives on the importance of security strategies and investments, it doesn’t have to be.
June 12, 2014 Added by:Dan Dieterle
With the mad rush to make things more user friendly and convenient, security is being left aside, even in devices that are being used to protect facilities!
June 11, 2014 Added by:Patrick Oliver Graf
Government BYOD is inevitable – IDC predicts that although currently “personal devices make up just 5 percent of the government market, that figure will grow at double-digit rates for the next three years.”
June 05, 2014 Added by:Dan Dieterle
OWASP ZAP is a web application penetration testing tool that has some great features. It is a very easy to use scanner that allows you to do manual or automatic website security checks. In this tutorial we will learn how to use the automatic attack feature.
June 02, 2014 Added by:Tripwire Inc
Executive leadership (including the board member) is not typically interested in operational security details such as answers to questions about specific security control metrics. This information is too detailed and will be viewed as “noise” by those outside the IT and security teams.
May 29, 2014 Added by:Dan Dieterle
People trust and share way too much on social media sites, and unfortunately this extends to government employees and military troops around the world.
Compliance and Security Trends... akikah tangerang on 09-19-2014
Carberp Botnet Lifecycle Infographic... akikah tangerang on 09-19-2014
The Benefits of FUD... akikah tangerang on 09-19-2014