Network Access Control

Af2c9843333cc1e2578ddf18b3eed066

Lessons From Hillary Clinton's Email Security Oversight

March 16, 2015 Added by:Peter Zavlaris

Hillary Clinton is in hot water for her decision to use a private email domain instead of her government-issued one when she was Secretary of State.

Comments  (4)

Af2c9843333cc1e2578ddf18b3eed066

The Battle Has Moved to the Endpoints and Beyond

March 11, 2015 Added by:Peter Zavlaris

While organizations may be adding solutions to their arsenals to combat threats at the endpoint, they may want to consider what else constitutes their perimeter.

Comments  (6)

6d117b57d55f63febe392e40a478011f

Public Sector Increasingly Targeted by Powerful DDoS Attacks

March 11, 2015 Added by:Anthony M. Freed

The Q4 2014 DDoS Trends Report (gated) reveals that the public sector is increasingly being targeted by distributed denial of service (DDoS) attacks.

Comments  (10)

Af7244bb99debb4a1152fa49a993a05c

Seagate Downplays Risks Posed by Business NAS Flaws

March 11, 2015 Added by:Eduard Kovacs

Seagate has confirmed the existence of vulnerabilities in Business Storage 2-Bay NAS devices and promised to patch the issues in May.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Now That We Have All That Data What Do We Do, Revisited

March 11, 2015 Added by:Anton Chuvakin

We have SO much security data, how do we make sense of it?

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Who Validates Alerts Validated by Your Alert Validator Software?

March 09, 2015 Added by:Anton Chuvakin

Pardon the idiotic title, but some recent discussions around security analytics have made this question practically relevant.

Comments  (4)

Af7244bb99debb4a1152fa49a993a05c

Angler Exploit Kit Uses Domain Shadowing to Evade Detection

March 04, 2015 Added by:Eduard Kovacs

The notorious Angler exploit kit has started leveraging a new technique to ensure that its malicious activities are not interrupted when the domains it uses are blacklisted, researchers at Cisco revealed on Tuesday.

Comments  (5)

E313765e3bec84b2852c1c758f7244b6

Malware Can Hide in a LOT of Places

March 04, 2015 Added by:Brent Huston

This article about research showing how malware could be hidden in Blu-Ray disks should serve as a reminder to us all that a lot of those “smart” and “Internet-enabled” devices we are buying can also be a risk to our information.

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

Weaknesses in Air Traffic Control Systems are a Serious Issue for FAA

March 04, 2015 Added by:Pierluigi Paganini

A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers.

Comments  (4)

Ebb72d4bfba370aecb29bc7519c9dac2

Killed by AI Much? A Rise of Non-deterministic Security!

March 03, 2015 Added by:Anton Chuvakin

My research into security analytics and Gartner recent forays into so-called “smart machines” research converge in this post. Hilarity ensues!

Comments  (2)

B359c06abd8c84e1a224a96ca47af8b9

PCI DSS 3.0 Updates and Ramifications for Network and Application Security

March 02, 2015 Added by:Barracuda Networks

The PCI DSS 3.0 is here. Since Jan 1, 2015 organizations under its purview are required to comply with the updated standard. Many of the changes stem from the recent high profile breaches, despite being compliant.

Comments  (3)

6d117b57d55f63febe392e40a478011f

Is Visual Hacking Undermining Your Enterprise Security?

March 02, 2015 Added by:Anthony M. Freed

A new study conducted by the Ponemon Institute reveals how easy it is to undermine enterprise security with low-tech visual hacking operations, where nine out of every ten attempts (88%) were found to be successful.

Comments  (2)

Ebb72d4bfba370aecb29bc7519c9dac2

SIEM/DLP Add-on Brain?

March 02, 2015 Added by:Anton Chuvakin

The good news is that we now a decent number of vendors that offer, essentially, an add-on brain for your SIEM. Some can also add a brain to your DLP, since it turned out that DLP is pretty brainless as well…

Comments  (2)

Bd07d58f0d31d48d3764821d109bf165

Prohibiting RC4 Cipher Suites

February 26, 2015 Added by:Tripwire Inc

I’ve long believed that RC4 was dead based on past research and multiple vendors have already declared it dead.

Comments  (15)

E595c1d49bf4a26f8e14ce59812af80e

Open Haus: Wi-Fi and Seamless Roaming for Mobile Workers

February 26, 2015 Added by:Patrick Oliver Graf

Whatever you picture, the fact is that mobility is now a key expectation of many employees. Those who work from laptops, tablets and other mobile devices need to be certain that the technology they depend on is able to follow them from place to place, without any service interruption.

Comments  (6)

E313765e3bec84b2852c1c758f7244b6

Keep Your Hands Off My SSL Traffic

February 25, 2015 Added by:Brent Huston

If you have been living under an online rock these last couple of weeks, then you might have missed all of the news and hype about the threats to your SSL traffic.

Comments  (6)

Page « < 1 - 2 - 3 - 4 - 5 > »