Network Access Control
April 09, 2015 Added by:Peter Zavlaris
The current problem, however, is that while IT has scaled and made tremendous advancements over the last decade, security continues to lag behind.
April 09, 2015 Added by:Joe Weiss
Cyber security is now a very hot subject. However, the discussions are about IT cyber security and data breaches not control system cyber security and equipment damage.
April 08, 2015 Added by:Mike Lennon
As we mark the one-year anniversary of disclosure of the now famous OpenSSL vulnerability (CVE-2014-0160) known as Heartbleed, security firm Venafi has released new research that shows how vulnerable Global 2000 organizations still are as a result of the flaw.
April 08, 2015 Added by:Patrick Oliver Graf
A cloud provider that has to adhere to stringent privacy and compliance regulations typically has more know-how and access to more resources than a small- or medium-size company. But it is just not possible to rely on a cloud provider for every aspect of data security.
April 02, 2015 Added by:Joe Weiss
There is a need to use the knowledge from previous control system cyber incidents when developing cyber forensics and monitoring technologies, cyber security technologies, training, and to adjust requirements such as the NERC CIPs, Regulatory Guide 5.71/NEI-0809, and CFATS to address what has actually been happening.
April 02, 2015 Added by:Electronic Frontier Foundation
Over the past few weeks, China has been using its country's Internet infrastructure to attack political opponents by turning normal users' web browsers into Denial of Service tools.
April 01, 2015 Added by:Eduard Kovacs
A researcher has determined that this behavior can be exploited for information disclosure and amplifying distributed denial-of-service (DDoS) attacks.
March 31, 2015 Added by:Anthony M. Freed
As the rapid expansion of connected devices continues unabated, one small issue may may prove to be a major challenge the Internet of Things (IoT) – the lack of effective methods to integrate accurate timing systems with devices and networks.
March 31, 2015 Added by:Identropy
Here are a few tips that you may want to include in your planning if you have not developed a response plan for your IAM environment
March 30, 2015 Added by:Patrick Oliver Graf
The South by Southwest (SXSW) Interactive Festival wrapped up last week in Austin, Texas, where 65,000 industry movers and shakers learned about some of the most innovative technology expected to hit the market over the next few years. What was on the minds of presenters, panelists, and attendees alike? “The Future” – all of its possibilities and its promise.
March 26, 2015 Added by:Joseph Pizzo
With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.
Premera Breach Emphasizes Risk to Holders of Medical Records — and the Importance of Network Security
March 26, 2015 Added by:Kevin Watson
The problem is data security is boring and tedious, making it easy to become the task we push off until tomorrow, and the next day, and the next day.
March 26, 2015 Added by:Brian Prince
A new report from Akamai Technologies names China as the top source of attack traffic on the Web.
March 25, 2015 Added by:Anthony M. Freed
The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015