October 02, 2014 Added by:Malwarebytes
No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis.
October 01, 2014 Added by:Dan Dieterle
As hardware and software manufacturers make public statements about hardening and protecting their services in the name of customer privacy, federal agencies speak out against it – let the smoke and mirrors game begin…
October 01, 2014 Added by:Rafal Los
On a recent call, one of the smartest technical folks I can name said something that made me reach for a notepad, to take the idea down for further development later. He was talking about why some of the systems enterprises believe are secure really aren't, even if they've managed to avoid some of the key issues.
September 29, 2014 Added by:Patrick Oliver Graf
When IT departments are not consulted, gaps in network security could appear.
September 26, 2014 Added by:InfosecIsland News
Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.
September 24, 2014 Added by:Tripwire Inc
You may find this surprising… 18 months is a year and a half of attackers wandering around, looting sensitive data while remaining undetected.
September 23, 2014 Added by:Rebecca Herold
Most of the 250+ organizations I’ve audited, and the hundreds of others I’ve had as clients, hate documentation. At least creating documentation. So, they don’t do it, or they do it very poorly. Or, they document things they don’t need to, and fail to document the important things.
September 23, 2014 Added by:Wendy Nather
One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.
September 17, 2014 Added by:Patrick Oliver Graf
America’s largest home improvement retailer seems to have a repair for everything, but after news that its payment systems had been breached, Home Depot has a lot of work ahead to get its own house in order. It faces a long road as it repairs its reputation, its relationships with customers and its network security.
September 17, 2014 Added by:Sahba Kazerooni
When all is well, there is nothing to worry about. A poorly configured backup system, however, can make life more than a little tricky when you can’t restore your files effectively or efficiently.
September 16, 2014 Added by:Sahba Kazerooni
What’s expected from you in your role as a CISO is expanding as companies rely heavily on more complicated information systems. There is a barrage of threats and more reliance on technology as businesses leave the pencil and paper behind. Status quo is not an option with so much change occurring within the IT industry, so let’s cover one aspect that is often overlooked; an effect...
September 10, 2014 Added by:Patrick Oliver Graf
The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...
Three Tips for Effective Vulnerability Asses... asad ali on 01-27-2015
Education Sector is Failing Security... Tama Gooden on 01-27-2015
Are you running a WordPress Blog? Update it ... saket wahi on 01-27-2015