Network Access Control
June 16, 2014 Added by:Gretchen Hellman
Securing the New IT can seem daunting. However, by broadening your skillsets and seeking to have impactful conversations with business executives on the importance of security strategies and investments, it doesn’t have to be.
June 12, 2014 Added by:Dan Dieterle
With the mad rush to make things more user friendly and convenient, security is being left aside, even in devices that are being used to protect facilities!
June 11, 2014 Added by:Patrick Oliver Graf
Government BYOD is inevitable – IDC predicts that although currently “personal devices make up just 5 percent of the government market, that figure will grow at double-digit rates for the next three years.”
June 05, 2014 Added by:Dan Dieterle
OWASP ZAP is a web application penetration testing tool that has some great features. It is a very easy to use scanner that allows you to do manual or automatic website security checks. In this tutorial we will learn how to use the automatic attack feature.
June 02, 2014 Added by:Tripwire Inc
Executive leadership (including the board member) is not typically interested in operational security details such as answers to questions about specific security control metrics. This information is too detailed and will be viewed as “noise” by those outside the IT and security teams.
May 29, 2014 Added by:Dan Dieterle
People trust and share way too much on social media sites, and unfortunately this extends to government employees and military troops around the world.
May 27, 2014 Added by:Tripwire Inc
So the question for us, security professionals and dabblers alike, is how do we make this moment one that makes a difference?
May 22, 2014 Added by:Rob Fuller
Most of the tools to exploit it either catch the authentication in NTLMv2/NTLMv1 (which is not always easy to crack) or assume administrative access (because they attempt to PSEXEC with the incoming session). Well, since MS08-068 that's much harder to pin down.
May 21, 2014 Added by:Joe Weiss
Stuxnet and Aurora utilized design features of the system or controllers to attack physical systems. Stuxnet and Aurora are not traditional network vulnerabilities and cannot be found or mitigated by using traditional IT security techniques.
May 20, 2014 Added by:Electronic Frontier Foundation
Here's how the House version of the USA Freedom Act compares to the Senate's version, what the new House version of the USA Freedom Act does, and what it sorely lacks.
May 13, 2014 Added by:Tripwire Inc
What do we mean when we talk about “hardening systems” to repel exploits and withstand intrusions? Much of this is captured in three simple concepts.
May 12, 2014 Added by:Anthony M. Freed
Though the threat has been recognized in theory for some time, researchers have now found direct evidence that bogus digital certificates not issued and authorized by legitimate site owners have been employed in establishing seemingly secure HTTPS connections.
April 28, 2014 Added by:Rebecca Herold
Here are the most common questions, and associated answers, that I’ve received from several of my small- to midsized clients about Heartbleed that have involved the most confusion; let’s clear up that misunderstanding!
Wanna Buy Some Dumps?... Xenon Jur on 08-21-2014
The Benefits of FUD... willy ben on 08-21-2014
Mobile Security: Tips for Using Personal Dev... sikawai duluan on 08-20-2014