Network Access Control

B16fab97daa7df5ccd0d892c340b0541

Falling Off the End of the Cyber Kill Chain

May 11, 2015 Added by:Anup Ghosh

In our zeal to declare prevention dead, we should not lose sight that $1 spent on prevention is worth $1M in post-breach incident response.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Rombertik Strike at MBR Latest in Long Line of Malware Self-Defense Tactics

May 07, 2015 Added by:Brian Prince

The malware, known as Rombertik, is the latest in a long line of examples of malware designed to make the lives of analysts and researchers harder.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Embracing Cyber Resilience in Today's Cyber-Enabled World

May 06, 2015 Added by:Steve Durbin

Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Scenario-based Training for Nuclear Power Plants Based on Actual Nuclear Plant Cyber Incidents

May 06, 2015 Added by:Joe Weiss

There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Inside IaaS Security Challenges for Enterprises

May 05, 2015 Added by:Brian Prince

Infrastructure-as-a-service can provide an attractive option for businesses, but approaching security wrong can come with a cost all its own.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

By All Means, Do as Little as Possible

May 04, 2015 Added by:PCI Guru

I write this because I have had enough of arguing over the lowest common denominator when it comes to securing networks, servers and applications.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

RSA 2015: Rise of Chaos!!

May 04, 2015 Added by:Anton Chuvakin

Here is my traditional RSA (#RSAC) reflection post for RSA 2015 Conference – all my personal opinions/impressions/thoughts, of course.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Password Alert for Chrome, and other Extensions

April 30, 2015 Added by:Malwarebytes

The extension, which only becomes functional once you’ve signed into your Google account, will throw up the metaphorical emergency flares whenever it notices you’ve entered your credentials into a rogue website.

Comments  (0)

6d117b57d55f63febe392e40a478011f

New Vulnerabilities Identified in Network Time Protocol Daemon (NTPD)

April 29, 2015 Added by:Anthony M. Freed

The Network Time Foundation’s NTP Project has released updates addressing multiple vulnerabilities discovered in NTPD, where exploitation by an attacker could result in a man-in-the-middle attack or cause a denial of service condition.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

RSA Wrap-Up: There's a Dark Cloud Looming Over Information Security

April 28, 2015 Added by:Peter Zavlaris

The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.

Comments  (0)

1c7e19555c747737c9064d29ea238f27

First Lose the “Cyber” – Then We Can Talk

April 28, 2015 Added by:Robert Vamosi

Cyber is derived from the Greek word meaning skilled in steering or governing, neither of which directly apply to the Internet which is decentralized by design and therefore cannot be directly steered nor governed. The Internet is a resilient network of free-flowing information and data.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

CozyDuke APT Behind White House, State Department Attacks: Kaspersky

April 23, 2015 Added by:Eduard Kovacs

According to the security firm, CozyDuke shares similarities with components spotted in previously documented APTs such as MiniDuke, CosmicDuke and OnionDuke.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Security of Internet of Things in Spotlight at RSA Conference

April 22, 2015 Added by:Brian Prince

The security challenges posed by the growth of the Internet of Things (IoT) are far from hypothetical - a point being hammered home here at the RSA Conference in San Francisco.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

How to Protect Yourself From Caller ID Spoofing

April 22, 2015 Added by:Tripwire Inc

Has an auto-dialer or telemarketer ever tried to scam you? Have you noticed that the numbers of certain incoming calls don’t seem accurate? If you have answered yes to any of these questions, you might have seen a spoofed caller ID.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Weak SOHO Router Default Passwords Leave Tens-of-Thousands at Risk

April 19, 2015 Added by:Anthony M. Freed

Security researcher Viktor Stanchev has publicly disclosed that Bell’s SOHO modem/routers are shipped with extremely weak default passwords that can be cracked in a matter of days, leaving tens-of thousands of users at risk of network intrusions and sensitive data loss.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »