Enterprise Security

E313765e3bec84b2852c1c758f7244b6

Accepting Identity Theft

October 06, 2014 Added by:Brent Huston

I can recall a time when I wasn’t concerned about data theft. Eventually, buzz words such as “breach” and “identity theft” became a regular part of my vocabulary.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Five Anti-Analysis Tricks That Sometimes Fool Analysts

October 02, 2014 Added by:Malwarebytes

No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis.

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Data Privacy Smoke and Mirrors

October 01, 2014 Added by:Dan Dieterle

As hardware and software manufacturers make public statements about hardening and protecting their services in the name of customer privacy, federal agencies speak out against it – let the smoke and mirrors game begin…

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Software Security - Hackable Even When It's Secure

October 01, 2014 Added by:Rafal Los

On a recent call, one of the smartest technical folks I can name said something that made me reach for a notepad, to take the idea down for further development later. He was talking about why some of the systems enterprises believe are secure really aren't, even if they've managed to avoid some of the key issues.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Find Security That Oursources Badly!

September 29, 2014 Added by:Anton Chuvakin

In this post, I wanted to touch on a sensitive topic: what security capabilities outsource badly?

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Industry 4.0: Flexible Production Needs Secure Networking

September 29, 2014 Added by:Patrick Oliver Graf

When IT departments are not consulted, gaps in network security could appear.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

What We Know About Shellshock and Why the Bash Bug Matters

September 26, 2014 Added by:InfosecIsland News

Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Goodwill Payment Vendor Breached for 18 months Undetected – Are You Surprised?

September 24, 2014 Added by:Tripwire Inc

You may find this surprising… 18 months is a year and a half of attackers wandering around, looting sensitive data while remaining undetected.

Comments  (0)

65be44ae7088566069cc3bef454174a7

If Compliance Isn’t Documented It Didn’t Happen

September 23, 2014 Added by:Rebecca Herold

Most of the 250+ organizations I’ve audited, and the hundreds of others I’ve had as clients, hate documentation. At least creating documentation. So, they don’t do it, or they do it very poorly. Or, they document things they don’t need to, and fail to document the important things.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

A Tenuous Grasp on Reality

September 23, 2014 Added by:Wendy Nather

One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

No Quick Fixes for Home Depot After Record Cyberattack

September 17, 2014 Added by:Patrick Oliver Graf

America’s largest home improvement retailer seems to have a repair for everything, but after news that its payment systems had been breached, Home Depot has a lot of work ahead to get its own house in order. It faces a long road as it repairs its reputation, its relationships with customers and its network security.

Comments  (6)

8b2a9c176d358811a479f771a5874c1b

3 Things To Consider When You Revisit Your Backup System

September 17, 2014 Added by:Sahba Kazerooni

When all is well, there is nothing to worry about. A poorly configured backup system, however, can make life more than a little tricky when you can’t restore your files effectively or efficiently.

Comments  (6)

E313765e3bec84b2852c1c758f7244b6

The Big Three Part 3: Incident Response

September 16, 2014 Added by:Brent Huston

In this installment, we’ll discuss the importance of accompanying incident detection with an effective, well-practiced incident response plan.

Comments  (9)

8b2a9c176d358811a479f771a5874c1b

3 Things To Consider When Revisiting Your Backup System

September 16, 2014 Added by:Sahba Kazerooni

What’s expected from you in your role as a CISO is expanding as companies rely heavily on more complicated information systems. There is a barrage of threats and more reliance on technology as businesses leave the pencil and paper behind. Status quo is not an option with so much change occurring within the IT industry, so let’s cover one aspect that is often overlooked; an effect...

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

Challenges with MSSPs?

September 11, 2014 Added by:Anton Chuvakin

In essence, MSSP may work for you, but you need to be aware of these and other challenges as well as to plan how you will work with your MSSP partner

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Who Will Foot the Bill for BYOD?

September 10, 2014 Added by:Patrick Oliver Graf

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »