Enterprise Security


DOE Cyber Security Procurement Language – Is It Comprehensive Enough

May 06, 2014 Added by:Joe Weiss

DOE recently issued their revised report on Cyber security procurement Language for Energy Delivery Systems dated April 2014.

Comments  (0)


A Windows Authentication Flaw Allows Deleted/Disabled Accounts to Access Corporate Data

May 06, 2014 Added by:Tal Be'ery

Since Kerberos authentication and authorization is based solely on the ticket – and not on the user’s credentials, it means that disabling the user’s account has no effect on their ability to access data and services.

Comments  (0)


The White House Big Data Report: The Good, The Bad, and The Missing

May 05, 2014 Added by:Electronic Frontier Foundation

Last week, the White House released its report on big data and its privacy implications, the result of a 90-day study commissioned by President Obama during his January 17 speech on NSA surveillance reforms.

Comments  (1)


ICS-ISAC: Understanding and Implementing Shared Situational Awareness

May 01, 2014 Added by:Tripwire Inc

SARA (the Situational Awareness Reference Architecture) provides applicable steps for creating local and shared situational awareness.

Comments  (0)


Don't Let Your Data Fall Into the Wrong Hands: 10 Simple Tips

May 01, 2014 Added by:John Grady

Data breaches have become common news items: Newsfactor Business reports that Court Ventures — a subsidiary of credit-report company Experian — was recently breached, exposing millions of U.S. Social Security numbers to criminals.

Comments  (0)


When it's Time to Share Information: How Heartbleed Got it Right

April 30, 2014 Added by:Tripwire Inc

For all of the chaos and exposure that came with the Heartbleed OpenSSL vulnerability, there is one thing that the security community got right – broad, loud communication to everyone and their mother.

Comments  (0)


Security Monitoring Planning Tool?

April 24, 2014 Added by:Anton Chuvakin

The easy stuff is for wussies – how about I dedicate my time to creating a structured approach for deciding which monitoring technology to use under various circumstances?

Comments  (0)


Verizon 2014 DBIR: Hide Your Servers and Call the Cops

April 23, 2014 Added by:Tripwire Inc

Know what you have, know how it’s vulnerable, configure it securely, and continuously monitor it to ensure it isn’t compromised and remains secure.

Comments  (0)


NIST Abandons Cryptography Algorithm in Wake of NSA Backdoor Concerns

April 22, 2014 Added by:Anthony M. Freed

NIST has officially announced the decision to remove the cryptographic algorithm from its revised guidance on random number generators

Comments  (0)


Let’s Get Proactive with End User Security

April 22, 2014 Added by:Brent Huston

Powerful malicious software apps are all over the Net, like website land mines, just waiting to explode into your computer if you touch them.

Comments  (0)


Stop the Bleeding: How Enterprises Can Address the Heartbleed Bug

April 21, 2014 Added by:Patrick Oliver Graf

If your provider is not hurrying to patch the hole in their OpenSSL implementation and/or taking steps to better implement a defense in depth framework, you may be justified in hitting the panic button.

Comments  (0)


An Open Letter to Executives

April 17, 2014 Added by:PCI Guru

I should have published this letter a long time ago as this is not a new issue.

Comments  (0)


FAQs Concerning the Legal Implications of the Heartbleed Vulnerability

April 16, 2014 Added by:David Navetta

Overall, in most cases, the Heartbleed vulnerability and associated security and legal risk is manageable as long as organizations take swift action to remediate their risk.

Comments  (0)


Security Pros Need Better Security Awareness Training Options

April 16, 2014 Added by:Tripwire Inc

One of the basic security measures that every company should be taking is giving security awareness training to its employees.

Comments  (0)


Would a Proprietary OpenSSL Have Been More Secure than Open Source?

April 16, 2014 Added by:Rebecca Herold

The OpenSSL Heartbleed vulnerability has resurrected the age-old debate of whether or not open source code is more or less secure than proprietary code.

Comments  (0)


Is User Experience Part of Your Security Plan?

April 15, 2014 Added by:Tripwire Inc

One common theme across the information organizations that I work with is that everyone wants to do the right thing. Unfortunately, that often means onerous and complicated security policies that translate into awkward steps that users must take.

Comments  (1)

Page « < 3 - 4 - 5 - 6 - 7 > »